Choose the best description of what an IDS does in a computer network.
Think about what an IDS does after detecting suspicious activity.
An IDS watches network or system activity to find signs of attacks or policy breaches and then alerts the security team. It does not block traffic or encrypt data.
Select the IDS type that inspects data packets traveling through the network.
Consider which IDS type is placed on the network to watch traffic.
Network-based IDS (NIDS) monitors network traffic to detect suspicious patterns. Host-based IDS runs on individual devices.
Analyze the following statements and select the correct difference.
Think about how each IDS identifies threats.
Signature-based IDS looks for known attack patterns, while anomaly-based IDS identifies unusual behavior that differs from normal activity.
Choose the best explanation for why false alarms occur and their impact.
Consider what happens when the IDS mistakes safe actions for threats.
False positives are alerts triggered by normal behavior mistaken as malicious, which can overwhelm security teams and reduce trust in alerts.
Select the option that correctly distinguishes IDS from IPS.
Think about whether the system takes action or just reports.
IDS monitors and alerts on threats but does not block them. IPS can detect and also block or prevent attacks in real time.