exam questions

Exam CV0-003 All Questions

View all questions & answers for the CV0-003 exam

Exam CV0-003 topic 1 question 68 discussion

Actual exam question from CompTIA's CV0-003
Question #: 68
Topic #: 1
[All CV0-003 Questions]

Which of the following will provide a systems administrator with the MOST information about potential attacks on a cloud IaaS instance?

  • A. Network flows
  • B. FIM
  • C. Software firewall
  • D. HIDS
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
i_bird
Highly Voted 2 years, 8 months ago
Answer is HIDS cloud IaaS instance aka a host or node or vm.
upvoted 15 times
reto1
8 months ago
HIDS monitors the host for suspicious activities and provides detailed insights into potential attacks, including unauthorized access attempts, changes to system files, and other indicators of compromise. It analyzes logs and system behavior, offering alerts and reports on potential threats specific to that instance.
upvoted 1 times
...
...
KOINU7
Highly Voted 2 years, 3 months ago
I am going with A because it says potential attacks. HIDS is detection of current attack.
upvoted 6 times
...
uzey
Most Recent 9 months ago
Selected Answer: A
Network flows provide the most comprehensive and detailed information about potential attacks on a cloud IaaS instance. By analyzing network traffic patterns, anomalies, and deviations from normal behavior, a system administrator can identify potential threats such as port scans, DDoS attacks, and unauthorized access attempts.
upvoted 2 times
...
Sweety_Certified7
1 year, 1 month ago
Selected Answer: D
HIDS monitors activity on individual hosts, including file system changes, log entries, and system calls, to detect and respond to potential security threats. It can provide valuable insights into attacks targeting specific hosts within the IaaS environment. And, the question does not explicitly refer to network-related information, HIDS would be the correct answer. Not A: Network flows.
upvoted 2 times
...
kuzummjakk
1 year, 2 months ago
Selected Answer: D
Absolutely HIDS. You CAN use network flows in some cases, but that's not it's purpose. It's a HIDS's purpose.
upvoted 1 times
...
germancano14
1 year, 7 months ago
Selected Answer: D
HIDS. Chatgpt says network flow but HIDS is specifically for the host it is installed and the question is talking about 1 specific instance. Option D, Host-Based Intrusion Detection System (HIDS), is indeed an important security tool, but it primarily focuses on monitoring activities and events at the host or individual instance level. While it can provide valuable information about potential attacks or anomalies occurring on a specific system, it may not offer as comprehensive information about attacks on a cloud IaaS instance as network flow analysis does.
upvoted 2 times
...
Francois1984
1 year, 8 months ago
Selected Answer: D
"Intrusion Detection/Intrusion Prevention System (IDS/IPS)" would provide a systems administrator with the MOST information about potential attacks on a cloud Infrastructure as a Service (IaaS) instance. (Copied from ChatGPT)
upvoted 3 times
...
Sunshine_boy38
1 year, 10 months ago
My answer goes for HIDS (D) - HIDS is designed to monitor and analyze activities and events occurring on a specific host or server. To provide valuable information about potential attacks by analyzing system logs, detecting unauthorized access attempts, identifying unusual or suspicious behavior, and raising alerts for known attack patterns or signatures. It can help the administrator identify and respond to security incidents promptly, protecting the cloud IaaS instance and its resources. However, choice for network flows only focuses on monitoring network traffic and analyzing network flows for anomalies. While network flow monitoring can provide insights into network activity, it may not provide comprehensive information about potential attacks targeting the IaaS instance itself.
upvoted 1 times
...
BeauChateau
2 years, 1 month ago
Selected Answer: A
A. Network flows. Network flows provide the most information about potential attacks on a cloud IaaS instance because they capture all traffic between the instance and the network, including both inbound and outbound traffic. Network flows provide insights into network behavior, such as communication patterns, traffic volume, and protocols used. This information can be used to detect anomalies, such as a sudden increase in traffic or traffic from unexpected sources, which could indicate a potential attack.
upvoted 5 times
TheFivePips
12 months ago
HIDS is literally designed to monitor and analyze activity on individual host systems, looking for signs of suspicious behavior or known attack patterns. It would give you much much more information that is RELEVANT to security.
upvoted 1 times
...
kuzummjakk
1 year, 2 months ago
give us your comptia answer, not your chatgpt answer
upvoted 1 times
...
...
Stella02
2 years, 3 months ago
Selected Answer: D
It says IAAS instance. HIDS is the correct answer.
upvoted 1 times
...
TheGinjaNinja
2 years, 4 months ago
Selected Answer: A
Answer is HIDS
upvoted 1 times
...
Not_That_Guy
2 years, 7 months ago
Selected Answer: A
HIDS is more PaaS and just alerts to potential threats, Network Flows gives the most information for IaaS.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago