Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 373 discussion

Actual exam question from ISC's CISSP
Question #: 373
Topic #: 1
[All CISSP Questions]

Which of the following security tools monitors devices and records the information in a central database for further analysis?

  • A. Antivirus
  • B. Host-based intrusion detection system (HIDS)
  • C. Security orchestration automation and response
  • D. Endpoint detection and response (EDR)
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
stickerbush1970
Highly Voted 2 years, 2 months ago
Selected Answer: D
Agree with D.
upvoted 6 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
lsiau76
Most Recent 6 months, 2 weeks ago
Selected Answer: B
Its between HIDS and EDR. But I take HIDS, The questions states ' monitors devices and records the information' it does not ask for any response or action. Thus B meets this criteria better.
upvoted 1 times
...
Hongjun
8 months ago
Selected Answer: C
there is no central database for host based or endpoint.
upvoted 1 times
...
Soleandheel
11 months, 2 weeks ago
D. Endpoint detection and response (EDR) Endpoint detection and response (EDR) tools are designed to monitor endpoint devices (e.g., computers, servers, mobile devices) and record information about their activities. This information is typically stored in a central database for analysis.
upvoted 1 times
...
liebeskind
1 year, 6 months ago
Selected Answer: C
"Security orchestration, automation and response, or SOAR, is a stack of compatible software programs that enables an organization to collect data about security threats and respond to security events with little or no human assistance"
upvoted 1 times
...
oudmaster
1 year, 10 months ago
In real-world, you don't install EDR or a central database (which is usually a server). Because EDR is intended for endpoints (Desktops and Laptops that run client OSs). ! However, I will go with Option D, because Option C (SOAR) is not used for further analysis, but for response.
upvoted 1 times
...
Delab202
1 year, 11 months ago
Selected Answer: D
One approach that’s becoming increasingly popular is endpoint detection and response (EDR). As a product category rather than a defined standard, EDR software varies in its features. Most solutions focus on gathering all sorts of behaviors on individual hosts and across the network, then using them to investigate suspicious activities. Each host with EDR installed runs an agent that monitors processes, configuration changes, network connections, and file system activity. Then it’s all gathered into a centralized reporting system you can use to analyze host health and trends, including, but not limited to, signs of attack or other security risks.
upvoted 1 times
...
Ivanchun
1 year, 11 months ago
Selected Answer: C
If B and D are central database, A is not that purpose, I vote C
upvoted 1 times
...
Jamati
2 years ago
Selected Answer: D
From official study guide page 9th edition - page 558 Some EDR solutions employ an on-device analysis engine whereas others report events back to a central analysis server or to a cloud solution. The goal of EDR is to detect abuses that are potentially more advanced than what can be detected by traditional antivirus programs or HIDSs
upvoted 3 times
...
pingundas
2 years ago
Selected Answer: D
EDR – Endpoint Detection and Response EDR (endpoint detection and response) continuously monitors endpoints (desktops, laptops, mobile devices, servers, or any device connected to an organization’s network) to detect malicious behavior.
upvoted 2 times
...
Humongous1593
2 years, 1 month ago
Selected Answer: B
Much like a home security system, HIDS software logs the suspicious activity and reports it to the administrators managing the devices or networks. https://www.dnsstuff.com/host-based-intrusion-detection-systems Not the defacto source of information but we are monitoring and reporting. Doesn't say taking action.
upvoted 4 times
franbarpro
2 years, 1 month ago
Can we do analysis with HIDS? Think about Snort!
upvoted 1 times
...
...
inmymind84
2 years, 1 month ago
Selected Answer: D
It is D
upvoted 4 times
...
Loveguitar
2 years, 2 months ago
Endpoint detection and response (EDR) is the right answer. SOAR does not do the analysis later, it actually analyzes the data. EDR is the one that sends the information to a database or SIEM or SOAR for later analysis.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...