Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
An IT auditor assessing the deployment of an intrusion detection system (IDS) would have the highest concern with which of the following:
A signature-based IDS is ineffective with new types of attacks.
The IDS is used to detect encrypted traffic.
A behavior-based IDS is reporting many false alarms.
IDS sensors are placed outside of the firewall.
An IDS cannot detect attacks within encrypted traffic, and it would be a concern if someone were misinformed and thought that the IDS could detect attacks in encrypted traffic. An organization can place sensors outside of the firewall to detect attacks. These sensors are placed in highly sensitive areas and on extranets. Causing many false alarms is normal for a behavior-based IDS, and should not be a matter of concern. Being weak against new types of attacks is also expected from a signature-based IDS, because it can only recognize attacks that have been previously identified.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.