header bg

Scan QR code or get instant email to install app

Question:

What kind of service will a corporation install to monitor network traffic or host system behavior in order to identify suspicious activity?

A IDS.
explanation

An intrusion detection system (IDS) will monitor and notify you of any suspicious activity. The IDS can be network-based or host-based, which means it runs in the background as a process. Proxy servers are used to regulate network traffic entering and exiting a network. Unified Threat Management (UTM) offers a variety of security functions on a single system. ATM (Asynchronous Transfer Mode) refers to the simultaneous transfer of different types of traffic (voice and data) across the same communication lines.

Related Information