Which system detects intrusions by matching traffic against a database of known attack signatures?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which system detects intrusions by matching traffic against a database of known attack signatures?

Explanation:
Matching traffic against a database of known attack signatures is the signature-based NIDS approach. This type of system keeps a library of signatures—patterns that reflect previously observed exploits or malicious behaviors—and scans network traffic in real time, raising alerts when a signature matches. It’s highly effective for known threats and can be very precise, but it relies on up-to-date signatures to catch new variants and may miss novel or heavily obfuscated attacks. The other options describe attacker techniques or encoding methods, not the detection mechanism itself.

Matching traffic against a database of known attack signatures is the signature-based NIDS approach. This type of system keeps a library of signatures—patterns that reflect previously observed exploits or malicious behaviors—and scans network traffic in real time, raising alerts when a signature matches. It’s highly effective for known threats and can be very precise, but it relies on up-to-date signatures to catch new variants and may miss novel or heavily obfuscated attacks. The other options describe attacker techniques or encoding methods, not the detection mechanism itself.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy