{"id":120,"date":"2022-11-28T10:57:46","date_gmt":"2022-11-28T10:57:46","guid":{"rendered":"https:\/\/exampracticetests.com\/c\/CAS-004\/comptia-casp-cas-004-question112\/"},"modified":"2022-11-28T10:57:46","modified_gmt":"2022-11-28T10:57:46","slug":"comptia-casp-cas-004-question112","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/c\/CAS-004\/comptia-casp-cas-004-question112\/","title":{"rendered":"CompTIA CASP+ CAS-004 &#8211; Question112"},"content":{"rendered":"<div class=\"question\">A company&#039;s Chief Information Officer wants to implement IDS software onto the current system&#039;s architecture to provide an additional layer of security. The software must be able to monitor system activity, provide information on attempted attacks, and provide analysis of malicious activities to determine the processes or users involved.<br \/>\nWhich of the following would provide this information?<br \/><strong><br \/>A.<\/strong> HIPS<br \/><strong>B.<\/strong> UEBA<br \/><strong>C.<\/strong> HIDS<br \/><strong>D.<\/strong> NIDS<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nReference: <a href=\"https:\/\/www.sciencedirect.com\/topics\/computer-science\/host-based-intrusion-detection-systems\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">https:\/\/www.sciencedirect.com\/topics\/computer-science\/host-based-in&#8230;<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A company&#039;s Chief Information Officer wants to implement IDS software onto the current system&#039;s architecture to provide an additional layer of security. The software must be able to monitor system activity, provide information on attempted attacks, and provide analysis of malicious activities to determine the processes or users involved. Which of the following would provide [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,115],"class_list":["post-120","post","type-post","status-publish","format-standard","hentry","category-comptia-casp-cas-004","tag-comptia-casp-cas-004","tag-question-112"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/c\/CAS-004\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}