104k views
3 votes
A system that creates logs of all network traffic that was permitted to pass the firewall and then analyzes those logs for signs of attempted or successful intrusions is called

a. log analysis.
b. intrusion detection systems.
c. continuous monitoring.
d. defense in depth.

User Ahmad Ajmi
by
8.1k points

1 Answer

3 votes

Final answer:

An intrusion detection system is a system that creates logs of network traffic that passed through a firewall and analyzes those logs for signs of attempted or successful intrusions.

Step-by-step explanation:

The correct answer to this question is b. intrusion detection systems.

An intrusion detection system (IDS) is a security software or hardware device that monitors network traffic for unusual or malicious activity. IDSs can analyze logs of network traffic that passed through a firewall and look for signs of attempted or successful intrusions.

For example, an IDS might analyze log entries to identify patterns of known attack signatures or anomalies in network traffic that could indicate a security breach. This analysis helps to identify and respond to potential threats in real-time.

User Temoncher
by
7.0k points