Questionwhen running snort ids why may there be no alertsif

Assignment Help Computer Engineering
Reference no: EM13349507

Question

When running Snort IDS why may there be no Alerts?

If we only went to a few web sites, why are there so several alerts?

What are benefits of logging more information in the alerts file

what the drawback of logging more information in the alerts file

what is the gain of using rule sets for Snort web site?

Explain in plain English at least one type of ruleset you would want to add a high level security network and why with reason?

If a person with malicious intent were to get to your network and have read or write access to your IDS log how might they use that information to their advantage
An intrusion prevention system be able to either wait until it has all of the information it needs, or be able to allow packets throughout based on statistics (guess or previously known facts) what are advantages and disadvantages of each approach?

So, bad guy decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; the system can permit all traffic through (without being check) or be able to deny all traffic until the system comes back up. What are the factors that you must consider in making this design choice?

What did you find particularly useful about this lab (please be specific)? What if anything was complex to follow? What would you change to create it better?

Reference no: EM13349507

Questions Cloud

Questionassume you want to deposit a certain amount of : questionassume you want to deposit a certain amount of money into a saving account and then leave it alone to draw
Question 1 a portion of the net fixed manufacturing : question 1. a portion of the net fixed manufacturing overhead cost incurred throughout a period cana. be excluded from
Question1 prove that it is impossible to extend a : question1. prove that it is impossible to extend a comparison-based implementation of the priority queue adt in which
Question hungry and feed foundation is a non-profit : question hungry and feed foundation is a non-profit organization that has a cost of capital of 10 . the foundation is
Questionwhen running snort ids why may there be no alertsif : questionwhen running snort ids why may there be no alerts?if we only went to a few web sites why are there so several
Question the john clock shop manufactures clocks on a : question the john clock shop manufactures clocks on a highly automated assembly line. its costing system use two cost
Questiontranslate the following c program to mips : questiontranslate the following c program to mips assembly.int fibint nif n 0 return 0 else if n 1 return 1 else
Question currently moodys investors services issued a : question currently moodys investors services issued a special comment explain best practices for the role of audit
Questiongenerate an er model for each of following : questiongenerate an er model for each of following descriptions-a a large organization has some parking lots that are

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the state of it systems development

What is the current state of IT systems development? How do systems development approaches affect  business?

  Removing the ambiguities in algorithms representation

Explain how the use of primitives helps in removing the ambiguities in an algorithm’s representation?

  Expalin how to make a bookexception class

generate an error message that is passed to the Exception class constructor for the Message property when a book does not meet the price-to-pages ratio.

  Algorithm to read an arbitrary number

Develop an algorithm to read an arbitrary number of the data records, each consisting of a name, age, and code. A Code of 1 will indicate female, a code of 2 will indicate male.

  Execute a recursive directory traversal

Execute a recursive directory traversal.

  Studying about the network attack

Describe how a network attacker (an active attacker that can intercept or forge network packets, etc.) could steal secure google.com cookies.

  Amazon kindle changed the number of print books

Has popularity of the Amazon Kindle changed number of print books Kindle users buy.

  Calculate the stress and strain in a steel rod of diameter d

Write down a main function and the following functions to compute the stress and strain in a steel rod of diameter D (inches) and length L (inches) subject to the compression loads p of 10,000 to 1,000,000 pounds in increments of 100,000 pounds. T..

  How the "right" database design can rarely be decided

The "right" database design can rarely be decided on the basis of normalization principle alone. Do you agree or disagree? explain.

  Program to calculate the weight of students

We have run regression analysis along with the resulting estimated regression equation as follows:” the estimated weight equals (-180 pounds) plus (5 pounds times the height in inches).” Write down the program to calculate the weight of students.

  Compare and contrast cisc architecture and risc architecture

how to Compare and contrast CISC architecture and RISC architecture.

  Compare and evaluate the two different styles

What do you think are the pros of using frames.Compare and evaluate the two different styles.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd