Q: You’re an IT support specialist tasked with setting up a NIDS system to monitor your company’s network traffic for suspicious behavior. Which constraint must you consider when you set up the NIDS?
or
Q: As an IT support professional, it is your responsibility to configure an NIDS system to watch over network traffic in your firm and look for unusual activity. Which limitation needs to be taken into account for NIDS configuration?
- The monitored traffic must pass through the NIDS.
- You must be able to monitor and access all traffic, not just the traffic flowing directly through the NIDS device.
- The NIDS must have access to all outgoing traffic.
- The NIDS must have access to all incoming traffic.
Explanation: For the NIDS to effectively analyze and detect suspicious behavior, it needs to be able to see and inspect all relevant network traffic. This often requires the traffic to be directed through or mirrored to the NIDS.