0
0
Computer Networksknowledge~20 mins

Intrusion Detection Systems (IDS) in Computer Networks - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
IDS Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
What is the primary difference between Network-based IDS and Host-based IDS?

Choose the option that best explains the main difference between Network-based Intrusion Detection Systems (NIDS) and Host-based Intrusion Detection Systems (HIDS).

ANIDS monitors network traffic across multiple devices, while HIDS monitors activities on a single host or device.
BNIDS only detects malware, while HIDS only detects unauthorized user logins.
CNIDS operates only on encrypted traffic, while HIDS operates only on unencrypted traffic.
DNIDS requires installation on each device, while HIDS is deployed on a central network switch.
Attempts:
2 left
💡 Hint

Think about where each system collects data from.

📋 Factual
intermediate
2:00remaining
Which IDS detection method relies on known attack patterns?

Identify the IDS detection method that uses predefined signatures or patterns of known attacks to detect intrusions.

AAnomaly-based detection
BSignature-based detection
CHeuristic-based detection
DBehavior-based detection
Attempts:
2 left
💡 Hint

It matches traffic against a database of known threats.

🔍 Analysis
advanced
2:00remaining
What is a major limitation of anomaly-based IDS?

Analyze the following options and select the major limitation commonly associated with anomaly-based Intrusion Detection Systems.

AThey often generate a high number of false positives.
BThey cannot detect new or unknown attacks.
CThey require constant updates of attack signatures.
DThey only monitor network traffic, not host activity.
Attempts:
2 left
💡 Hint

Consider what happens when normal behavior varies a lot.

Comparison
advanced
2:00remaining
Compare IDS and IPS in terms of response to detected threats.

Which statement correctly compares how Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) respond to threats?

ABoth IDS and IPS only alert administrators without blocking threats.
BIDS blocks threats automatically; IPS only logs threats for review.
CIDS and IPS are the same and both block threats automatically.
DIDS detects and alerts but does not block threats; IPS detects and actively blocks threats.
Attempts:
2 left
💡 Hint

Think about whether the system takes action or just informs.

Reasoning
expert
3:00remaining
Why might an organization choose a hybrid IDS approach?

Consider the benefits and drawbacks of different IDS types. Why would an organization implement both Network-based and Host-based IDS together?

ATo avoid the need for any manual monitoring by administrators.
BBecause Host-based IDS is cheaper and can replace Network-based IDS entirely.
CTo combine broad network monitoring with detailed host activity analysis for better threat detection.
DBecause Network-based IDS cannot detect any threats without Host-based IDS.
Attempts:
2 left
💡 Hint

Think about coverage and depth of monitoring.