CISA Certified Information Systems Auditor – Question2155

Which of the following type of an IDS resides on important systems like database, critical servers and monitors various internal resources of an operating system?

A.
Signature based IDS
B. Host based IDS
C. Network based IDS
D. Statistical based IDS

Correct Answer: B

Explanation:

Explanation:
Host Based IDS resides on important systems like database, critical servers and monitors various internal resources of an operating system.
Also, you should know below mentioned categories and types of IDS for CISA exam
An IDS works in conjunction with routers and firewall by monitoring network usage anomalies.
Broad categories of IDS include:
1. Network Based IDS
2. Host Based IDS
Network Based IDS
They identify attack within the monitored network and issue a warning to the operator.
If a network based IDS is placed between the Internet and the firewall, it will detect all the attack attempts whether or not they enter the firewall
Network Based IDS are blinded when dealing with encrypted traffic
Host Based IDS
They are configured for a specific environment and will monitor various internal resources of the operating system to warn of a possible attack.
They can detect the modification of executable programs, detect the detection of files and issue a warning when an attempt is made to use a privilege account.
They can monitor traffic after it is decrypted and they supplement the Network Based IDS.
Types of IDS includes:
Statistical Based IDS – This system needs a comprehensive definition of the known and expected behavior of system
Neural Network – An IDS with this feature monitors the general patterns of activity and traffic on the network, and create a database. This is similar to statistical model but with added self-learning functionality.
Signature Based IDS – These IDS system protect against detected intrusion patterns. The intrusive pattern they can identify are stored in the form of signature.
The following were incorrect answers:
The other types of IDS mentioned in the options do not resides on important systems like database and critical servers
Reference:
CISA review manual 2014 Page number 346 and 347