An administrator creates a SPAN port that feeds traffic to a security tool. What type of tool is used to monitor suspicious network traffic without blocking it?

Get more with Examzify Plus

Remove ads, unlock favorites, save progress, and access premium tools across devices.

FavoritesSave progressAd-free
From $9.99Learn more

Prepare for the WGU ITAS6291 D488 Cybersecurity Architecture and Engineering exam. Use flashcards and multiple-choice questions, each with explanations and guidance. Master your knowledge and excel in your exam!

In a scenario where an administrator creates a SPAN (Switched Port Analyzer) port to send a copy of network traffic to a security tool, a Network Intrusion Detection System (NIDS) is used to monitor for suspicious activity without taking action to disrupt or block that traffic. The primary role of a NIDS is to analyze the network traffic flowing through it and to detect any anomalies or potential security threats by inspecting packet data. This monitoring is passive; it does not interfere with the network's operation, which allows it to identify suspicious patterns and behaviors for further analysis or alerts.

The use of a SPAN port specifically supports this function, as it enables traffic to be mirrored from one or more VLANs (Virtual Local Area Networks) to the NIDS, which can then perform deep packet inspection on the replicated data. If the NIDS detects a possible intrusion or malicious activity, it can generate alerts for administrators to review, enabling them to take appropriate action in response to potential threats without actively blocking traffic, which is crucial for environments where uptime is critical or when any disruptions could lead to significant consequences.

In contrast, a Network Intrusion Prevention System (NIPS) actively analyzes and can block or drop malicious traffic, which would not be suitable in scenarios

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy