{"id":197,"date":"2021-01-11T09:39:01","date_gmt":"2021-01-11T09:39:01","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question190\/"},"modified":"2021-01-11T09:39:01","modified_gmt":"2021-01-11T09:39:01","slug":"certified-cloud-security-professional-ccsp-question190","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question190\/","title":{"rendered":"Certified Cloud Security Professional &#8211; CCSP &#8211; Question190"},"content":{"rendered":"<div class=\"question\">Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed? <br \/><strong><br \/>A.<\/strong> IPS <br \/><strong>B.<\/strong> WAF <br \/><strong>C.<\/strong> Firewall <br \/><strong>D.<\/strong> IDS<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>D<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nExplanation: An intrusion detection system (IDS) is designed to analyze network packets, compare their contents or characteristics against a set of configurations or signatures, and alert personnel if anything is detected that could constitute a threat or is otherwise designated for alerting.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed? A. IPS B. WAF C. Firewall D. IDS Show Answer Hide Answer Correct Answer: D Explanation: Explanation: An intrusion detection system (IDS) is designed to analyze network packets, compare their contents or characteristics against [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,193],"class_list":["post-197","post","type-post","status-publish","format-standard","hentry","category-certified-cloud-security-professional-ccsp","tag-certified-cloud-security-professional-ccsp","tag-question-190"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}