Which of the following solutions will be used to deploy the IDS?

Posted by: Pdfprep Category: SY0-501 Tags: , ,

A company recently experienced data exfiltration via the corporate network. In response to the breach, a security analyst recommends deploying an out-of-band IDS solution. The analyst says the solution can be implemented without purchasing any additional network hardware.

Which of the following solutions will be used to deploy the IDS?
A . Network tap
B . Network proxy
C . Honeypot
D . Port mirroring

Answer: A

Explanation:

Port Mirroring, also known as SPAN (Switched Port Analyzer), is a method of monitoring network traffic. With port mirroring enabled, the switch sends a copy of all network packets seen on one port (or an entire VLAN) to another port, where the packet can be analyzed.

Leave a Reply

Your email address will not be published.