Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1.When running Snort IDS why might there be no alerts?

2.If we only went to a few web sites, why are there so many alerts?

3.What are the advantages of logging more information to the alerts file?


4.What are the disadvantages of logging more information to the alerts file?


5.What are the advantages of using rule sets from the snort web site?

6.Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?


7.If a person with malicious intent were to get into your network and have read/prepare access to your IDS log or rule set how could they use that information to their advantage?


8.An intrusion prevention system can either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?


9.So, the bad guy decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen, the system can allow all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you must consider in making this design decision?


10.What did you find particularly useful about this lab (please be specific)? What if anything was difficult to follow? What would you change to make it better? 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M988596

Have any Question?


Related Questions in Computer Engineering

Several of the cameras in the lab can capture a greyscale

Several of the cameras in the lab can capture a greyscale image either as an 8 bit image, or as a 12 bit image. What would be the difference between them, and what would be the benefit of using one over the other? What w ...

There are sorted sequences l1 and l2 with 5 and 4 elements

There are sorted sequences L1 and L2, with 5 and 4 elements respectively. a) How many comparisons will it take to merge L1 and L2 in the best case? How many for worst case? Explain your answers. b) Let [54, 26, 93, 17, 7 ...

Question suppose your corporate commercial website server

Question : Suppose your corporate commercial Website server is located in a demilitarized zone (DMZ) so that potential and existing customers can access it. Explain the steps you would take to secure the Web server and t ...

Part 1whats the importance of a documentation plan please

Part 1: What's the importance of a Documentation Plan? Please provide an example of a Documentation Plan that you would use. Part 2: How do you calculate how long a project will take? These questions are for my Introduct ...

During a year of operation a firm collects 650000 in

During a year of operation, a firm collects $650000 in revenue and spends $250000 on labor expense, raw materials, rent, and utilities. The firm's owner has provided $350000 of her own money instead of investing the mone ...

Give an example of a binary relation which is not

Give an example of a binary relation which is not transitive, and then give an example of a binary relation which is reflexive and transitive but not connected.

Show how an avl tree can have a deepest leaf at depth 4 and

Show how an AVL tree can have a deepest leaf at depth 4 and another leaf at depth 2, and still be balanced. Show the same thing for a Red/Black tree. If there were an AVL tree and Red/Black tree with deepest leaves at de ...

Remote direct memory access rdma enables efficient memory

Remote Direct Memory Access (RDMA) enables efficient memory access from one computer to another. Read about it using Google Scholar, ACM Digital Library or any professional literature tools. Write a 150-200 words (refere ...

Suppose in your company you formulate a python script that

Suppose in your company you formulate a Python script that inserts, updates, and deletes data in tables in a MySQL database. You post your Python script on a shared drive for other staff members to use. What are some the ...

Subnetting ip adress - 190 3500750 subnetwhat is the

Subnetting : IP adress - 190. 35.0.0 750 subnet What is the subnet mask? How many bit? What is 2 n-2 host? What is 2 n subnets? What are the first 5 subnets? What is the first and last IP of 2nd block? Answer all the que ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As