Physical Security

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

These questions are derived from the Self Test Software Practice Test for (ISC)2’s CISSP exam.

Objective: Physical Security
SubObjective: Intrusion Detection System

Single Answer, Multiple Choice

Which statement is NOT a characteristic of a network-based intrusion detection system (NIDS)?

 

 

  1. An NIDS monitors real-time traffic.
  2. An NIDS analyzes encrypted information.
  3. An NIDS analyzes network packets for intrusion.
  4. An NIDS does not monitor individual workstations in a network.

Answer:
B. An NIDS analyzes encrypted information.

 

 

Tutorial:
The primary disadvantage of a NIDS is its inability to analyze encrypted information. For example, the packets that traverse through a Virtual Private Network (VPN) tunnel cannot be analyzed by the NIDS.

An NIDS can either monitor a complete network or some portions of a segregated network. It remains passive while acquiring the network data. For example, an intrusion detection system (IDS) can be placed on the internal network to monitor either real-time traffic or a de-militarized zone (DMZ). In a DMZ, public servers, such as e-mail, DNS, and FTP servers, are hosted by an organization to segregate these public servers from the internal network. An NIDS monitors real-time traffic over the network, captures the packets, and analyzes them either through a signature database or against the normal traffic pattern behavior to ensure that there are no intrusion attempts or malicious threats. NIDS finds extensive commercial implementation in most organizations.

NIDS does not monitor specific workstations. A host-based IDS (HIDS) monitors individual workstations on a network. An intrusion detection agent should be installed on each individual workstation of a network segment to monitor any security breach attempt on a host.

Reference:
CISSP All-in-One Exam Guide, Chapter 4: Access Control, Intrusion Detection, pp. 200-209.

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>