Certified Ethical Hacker – CEH – 312-50 – Question340

Which of the following is designed to identify malicious attempts to penetrate systems?


A.
Intrusion Detection System
B. Firewall
C. Proxy
D. Router

Correct Answer: A

Explanation:

An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station.
References: https://en.wikipedia.org/wiki/Intrusion_detection_system