Question1 when running snort ids why valour there is no

Assignment Help Computer Engineering
Reference no: EM13349048

Question

1. When running Snort IDS why valour there is no alerts?

2. If we only went to a few web sites, why are there so many alerts?

3. What is compensation of logging more information to the alerts file?

4. What is disadvantage of logging more information to the alerts file?

5. What is compensation of using rule sets from the snort web site?

6. Describe at least one type of rule set you would want to add to a high level security network and give reasons?

7. If a person with malicious intent were to get into your network and have read or write access to your IDS log or rule set how could they use that information to their advantage?

8. An intrusion prevention system is able to either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What is advantage and disadvantage of each approach?

9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; the system can agree to all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you should consider in making this design decision?

10. What did you find mainly useful about this lab (please be specific)? What if anything was difficult to follow? What would you vary to make it better?

Reference no: EM13349048

Questions Cloud

Question 1which one of the different approaches to : question 1which one of the different approaches to organisation and management would you select as most relevant to the
Question1 use big-theta notation to classify traditional : question1. use big-theta notation to classify traditional grade school algorithms for addition and development. that is
Questionsuppose you have an array of numbers where each : questionsuppose you have an array of numbers where each value occurs at most twice.we consider sums of contiguous
Question 1 a electronic banking can be defined as the : question 1 a electronic banking can be defined as the automated delivery of new and traditional banking products and
Question1 when running snort ids why valour there is no : question1. when running snort ids why valour there is no alerts?2. if we only went to a few web sites why are there so
Questionyour company has revealed that it must develop : questionyour company has revealed that it must develop processes and infrastructure to keep up with its client
Questionconsider a scheduling problem where there are 5 : questionconsider a scheduling problem where there are 5 activities to be scheduled in four time slots. suppose we
Questionto take advantage of a string means to change the : questionto take advantage of a string means to change the first letter of each word in the string to uppercase. for
Question 1you have been approached by a tourism : question 1you have been approached by a tourism organisation to carry out marketing research for them. they have been

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define your ideal home network configuration in detail

explain your ideal home network configuration in detail. In this description, include the costs of all components such as routers, computers, printers, and back-up drives.

  Define between erp configuration and customization

How does this guide or limit the scope of an enterprise system implementation project.

  What is redundant data and why should it be avoided

What are the advantages of using relational databases in the development of interactive web applications.

  Write a program that takes its input from a binary file

The number a is the average of the numbers n1, n2, n3, and so forth. Hint: Write your program so that it first reads the entire file and computes the average of all the numbers, then closes the file, and then reopens the file and computes the stan..

  What required to happen in order for the database

If the computers of organization are to old, the database management system might not be installed in the organization and will not run properly or sometimes not at all. This information is good to remember as planning a particular database implem..

  Make java applet that displays the 13 standard colors

Write down an Java Applet that displays the 13 standard colors available in Java (back, blue, cyan, darkGray, gray, green, lightGray, magenta, orange, pink, red, white and yellow) in a set of 13 filled rectangles.

  Problem on encryption using a one-round version of des

Problem on encryption using a one-round version of DES.

  How to use an external css file to style

give a Submit button for the form, and make up a name for the PHP script that would handle the replies on the Web server. At this stage, nothing will happen if the user clicks the Submit button. Just concentrate on the HTML5.

  Why are java and javas gui are popular

The GUI offers all types of functionality in the graphical sense. Why are Java and Javas GUI are so popular? What are some applications that use a Java GUI.

  Computer instruction format

In the computer instruction format, the instruction length is 11 bits and size of an address field is 4 bits? Is it possible to have the 5 2-address instructions 45 1-address instructions 32 0-address instructions utilizing the format.

  Make a design flow chart or psuedocode algorithm

In either case, show the mortgage payment amount. Then, list the loan balance and interest paid for each payment over the term of the loan. On longer term loans, the list will scroll off the screen.

  Write down an assembly language program

Write down an assembly language program The product number from one to five (3 characters wide, right justified)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd