Which system detects intrusions by matching traffic against a database of known attack signatures?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which system detects intrusions by matching traffic against a database of known attack signatures?

Explanation:
Matching traffic against a database of known attack signatures is the signature-based NIDS approach. This type of system keeps a library of signatures—patterns that reflect previously observed exploits or malicious behaviors—and scans network traffic in real time, raising alerts when a signature matches. It’s highly effective for known threats and can be very precise, but it relies on up-to-date signatures to catch new variants and may miss novel or heavily obfuscated attacks. The other options describe attacker techniques or encoding methods, not the detection mechanism itself.

Matching traffic against a database of known attack signatures is the signature-based NIDS approach. This type of system keeps a library of signatures—patterns that reflect previously observed exploits or malicious behaviors—and scans network traffic in real time, raising alerts when a signature matches. It’s highly effective for known threats and can be very precise, but it relies on up-to-date signatures to catch new variants and may miss novel or heavily obfuscated attacks. The other options describe attacker techniques or encoding methods, not the detection mechanism itself.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy