EC-Council: Computer Hacking Forensic Investigator(CHFI-V10) |
||||
Module 8 : Network Forensics |
||||
Questions available : 133 |
You are not logged in. Please Login for track your learning progress |
|||
Go to Question No. |
Question No 0
If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
Comunity Comments:

Opted Answer: B
HIDS focuses on detecting threats at the host level by examining log files, process activity, and application behavior.
It may generate alerts for legitimate activities (repeated failed login attempts, unexpected spikes in resource usage etc.) that deviate from expected patterns, leading to false positives