0
0
Computer Networksknowledge~5 mins

Intrusion Detection Systems (IDS) in Computer Networks - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is an Intrusion Detection System (IDS)?
An IDS is a security tool that monitors network or system activities for malicious actions or policy violations and alerts administrators when such activities are detected.
Click to reveal answer
beginner
Name the two main types of IDS.
The two main types are Network-based IDS (NIDS), which monitors network traffic, and Host-based IDS (HIDS), which monitors activities on individual computers.
Click to reveal answer
intermediate
How does signature-based IDS detect threats?
Signature-based IDS detects threats by comparing network or system activity against a database of known attack patterns or signatures.
Click to reveal answer
intermediate
What is the main difference between IDS and IPS?
IDS detects and alerts about suspicious activity but does not block it, while Intrusion Prevention Systems (IPS) can detect and actively block or prevent the malicious activity.
Click to reveal answer
beginner
Why is it important to regularly update IDS signatures?
Regular updates ensure the IDS can recognize the latest threats and attack patterns, keeping the system protected against new vulnerabilities.
Click to reveal answer
Which type of IDS monitors traffic on a network?
AAnomaly-based IDS
BNetwork-based IDS (NIDS)
CSignature-based IDS
DHost-based IDS (HIDS)
What does a signature-based IDS rely on to detect attacks?
AKnown attack patterns
BUser behavior analysis
CRandom sampling
DEncryption keys
Which of the following is NOT a function of an IDS?
ABlocking malicious traffic automatically
BMonitoring system logs
CAlerting administrators about suspicious activity
DDetecting policy violations
Host-based IDS (HIDS) primarily monitors:
AFirewall configurations
BNetwork traffic between devices
CInternet service provider logs
DActivities on a single computer or device
Why should IDS signatures be updated regularly?
ATo improve network speed
BTo reduce power consumption
CTo detect new types of attacks
DTo increase storage space
Explain the difference between Network-based IDS and Host-based IDS.
Think about where the IDS is placed and what it watches.
You got /3 concepts.
    Describe how signature-based IDS works and why it needs regular updates.
    Consider how antivirus software works similarly.
    You got /3 concepts.