Reference no: EM132352638 
                                                                               
                                       
Question 1: 1.	List and briefly define three classes of intruders.
2.	What are two common techniques used to protect a password file?
3.	What are three benefits that can be provided by an intrusion detection system?
4.	What is the difference between statistical anomaly detection and rule-based intrusion detection?
5.	What metrics are useful for profile-based intrusion detection?
6.	What is the difference between rule-based anomaly detection and rule-based penetration identification?
7.	What is a honeypot?
8.	What is a salt in the context of UNIX password management?
9.	List and briefly define four techniques used to avoid guessable passwords.
Question 2: 
1.	List three design goals for a firewall.
2.	List four techniques used by firewalls to control access and enforce a security policy.
3.	What information is used by a typical packet filtering firewall?
4.	What are some weaknesses of a packet filtering firewall?
5.	What is the difference between a packet filtering firewall and a stateful inspection firewall?
6.	What is an application-level gateway?
7.	What is a circuit-level gateway?
8.	What are the common characteristics of a bastion host?
9.	Why is it useful to have host-based firewalls?
10.	What is a DMZ network and what types of systems would you expect to find on such networks?
11.	What is the difference between an internal and an external firewall?