Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 189 discussion

Actual exam question from ISC's CCSP
Question #: 189
Topic #: 1
[All CCSP Questions]

Which of the following is NOT something that an HIDS will monitor?

  • A. Configurations
  • B. User logins
  • C. Critical system files
  • D. Network traffic
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
kjjcraigskel
Highly Voted 4 years, 1 month ago
NIDS monitors network traffic! Not HIDS.
upvoted 23 times
kepalon
2 years, 8 months ago
HIDS will check the network traffic as well, but only related to the host
upvoted 4 times
...
...
Seke
Highly Voted 2 years, 11 months ago
Selected Answer: B
» Host IDS (HIDS): This type of IDS operates on a single host and monitors only *network traffic* that flows into and out of that host. In addition to monitoring a host’s network traffic, HIDS are often able to monitor *critical configurations* and *files* on a host and can be configured to alert on suspicious modifications. Similar to other host-based security controls, HIDS are prone to compromise if an attacker gains root-level access on that host. To combat this, HIDS logs should immediately be sent a remote system (like your centrally managed SIEM), and HIDS configurations and settings should be locked down and managed on a remote system. Consider installing a HIDS on your baseline images for your highly sensitive systems. Configure the HIDS to communicate with your SIEM or other centrally managed alerting dashboard. You can then deploy and manage those distributed HIDS in one fell swoop.
upvoted 10 times
...
sweetykaur
Most Recent 1 month, 1 week ago
Network traffic. Host-based Intrusion Detection Systems (HIDS) monitor configurations, user logins, and critical system files, but they don't typically monitor network traffic—that's the realm of Network-based Intrusion Detection Systems (NIDS).
upvoted 1 times
...
Mo22
7 months, 1 week ago
Selected Answer: D
NIDS dose monitor the network traffic not the HIDS
upvoted 1 times
...
Mo22
8 months ago
Selected Answer: D
An HIDS (Host-based Intrusion Detection System) monitors activities on a specific host or device, such as configurations, user logins, and critical system files. It does not typically monitor network traffic, which is the role of a Network-based Intrusion Detection System (NIDS).
upvoted 2 times
...
JohnnyBG
9 months, 3 weeks ago
Selected Answer: D
Host-based Intrusion Detection System [HIDS] focuses on monitoring & protecting individual hosts or devices within a network. Network-based Intrusion Detection System [NIDS] concentrates on monitoring network traffic to identify suspicious patterns & potential threats across the entire network
upvoted 1 times
...
escaprix
1 year, 5 months ago
Selected Answer: D
An HIDS primarily focuses on monitoring and analyzing activities occurring within the host or system itself. This includes monitoring configurations, user logins, critical system files, file integrity, process activity, and other host-specific events. The purpose of an HIDS is to detect suspicious or unauthorized activities on the host and raise alerts or take action accordingly. While network traffic is crucial for overall security monitoring, it falls under the purview of network-based monitoring systems rather than host-based systems like HIDS
upvoted 1 times
...
Pika26
1 year, 7 months ago
Selected Answer: D
D. Network traffic An HIDS (Host-based Intrusion Detection System) is designed to monitor and protect individual systems within a network by analyzing activities and events occurring on the host itself. It typically monitors configurations, user logins, and critical system files, among other things, to detect potential security threats or unauthorized activities.
upvoted 2 times
...
Pika26
1 year, 7 months ago
Selected Answer: D
D. Network traffic An HIDS (Host-based Intrusion Detection System) is designed to monitor and protect individual systems within a network by analyzing activities and events occurring on the host itself. It typically monitors configurations, user logins, and critical system files, among other things, to detect potential security threats or unauthorized activities.
upvoted 1 times
...
infosecdummy
2 years ago
Selected Answer: B
AIO CCSP states all but User Logins will be monitored.
upvoted 2 times
...
kepalon
2 years, 8 months ago
Selected Answer: B
B is correct!!! HIDS will monitor the inbout/outbound traffic of the host and the rest options as well. So the only remaining one is USERS
upvoted 2 times
...
skis4u
2 years, 12 months ago
SHOULD BE D -- FOR NETWORK TRAFFIC WE HAVE NIDS
upvoted 1 times
...
AlanJP
3 years, 4 months ago
B is sort of correct - HIDS doesn't monitor all network traffic but it monitors inbound and outbound packets for the device only
upvoted 2 times
...
nelombg
3 years, 5 months ago
A is the answer host-based IDS, you gain granular visibility into the systems and services you’re running so you can easily detect: System compromises Privileged escalations Installation of unwanted applications Modification of critical application binaries, data, and configuration files (e.g. registry settings, /etc/passwd) Rogue processes Critical services that have been stopped, or that failed to start User access to systems
upvoted 3 times
...
NobleGiantz
3 years, 9 months ago
Host IDS (HIDS): This type of IDS operates on a single host and monitors only network traffic that flows into and out of that host. In addition to monitoring a host’s network traffic, HIDS are often able to monitor critical configurations and files on a host and can be configured to alert on suspicious modifications.
upvoted 6 times
NobleGiantz
3 years, 9 months ago
B is correct.
upvoted 2 times
...
...
Ahbey_911
3 years, 10 months ago
HIDS does not monitor network traffic. D should be the answer
upvoted 4 times
...
nidoz
3 years, 10 months ago
should be D. HIDS doesn't monitor Network traffic
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...