Tremp is an IT Security Manager, and he is planning to deploy an IDS in his small company. He is looking for an IDS with the following characteristics:
– Verifies success or failure of an attack
– Monitors system activities Detects attacks that a network-based IDS fails to detect
– Near real-time detection and response
– Does not require additional hardware
– Lower entry cost
Which type of IDS is best suited for Tremp’s requirements?
A . Gateway-based IDS
B . Network-based IDS
C . Host-based IDS
D . Open source-based
Answer: C