answers with complete soultions verified 2025/2026
Which type of intrusion
de- tection system can
moni- tor and alert on
attacks, but cannot
stop them?
C
(A) Detective
(B) Intuitive
(C) Passive
(D) Reactive
Which solution can be
used to emulate
computer services,
such as mail and ftp,
and to capture
informa- tion related to
logins or ac- tions?
B
(A) Firewall
(B) Honeypot
(C) Intrusion
Detection System
(IDS)
(D) DeMilitarized
Zone (DMZ)
, CEH Module 12 Study Guide Exam questions and
answers with complete soultions verified 2025/2026
Sean who works as a
network administrator
has just deployed an
IDS in
, CEH Module 12 Study Guide Exam questions and
answers with complete soultions verified 2025/2026
his organization's
network. Sean
deployed an IDS that
generates four types
of alerts that include:
true positive, false
posi- tive, false
negative, and true
negative.In which of
the following
conditions does the
IDS generate a true
positive alert?
(A) A true positive is a
condition occurring
D
when an event
triggers an alarm
when no actual attack
is in progress.
(B)A true positive is a
con- dition occurring
when an IDS identifies
an activity as
acceptable behavior
and the activity is
, CEH Module 12 Study Guide Exam questions and
answers with complete soultions verified 2025/2026
acceptable.
(C) A true positive is a
con- dition occurring
when an IDS fails to
react to an ac- tual
attack event.
(D) A true positive is a