Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSLC Topic 7 Question 45 Discussion

Actual exam question for GIAC's GSLC exam
Question #: 45
Topic #: 7
[All GSLC Questions]

Which of the following technologies is used to detect unauthorized attempts to access and manipulate computer systems locally or through the Internet or an intranet?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Helene
6 months ago
True. IDS is specifically for detecting unauthorized attempts.
upvoted 0 times
...
Oretha
7 months ago
Firewall blocks unwanted traffic, but IDS detects intrusions.
upvoted 0 times
...
Amie
7 months ago
So, not the Firewall?
upvoted 0 times
...
Helene
7 months ago
Agree. IDS seems right. It monitors for suspicious activities.
upvoted 0 times
...
Oretha
7 months ago
Yeah, I think the answer is IDS. Intrusion Detection System.
upvoted 0 times
...
Amie
7 months ago
Did you see the question about unauthorized access detection?
upvoted 0 times
...

Save Cancel