Reference no: EM132456641
Question 1. List and briefly define three classes of intruders.
Question 2. What are two common techniques used to protect a password file?
Question 3. What are three benefits that can be provided by an intrusion detection system?
Question 4. What is the difference between statistical anomaly detection and rule-based intrusion detection?
Question 5. What metrics are useful for profile-based intrusion detection?
Question 6. What is the difference between rule-based anomaly detection and rule-based penetration identification?
Question 7. What is a honeypot?
Question 8. What is a salt in the context of UNIX password management?
Question 9. List and briefly define four techniques used to avoid guessable passwords.
Question 10. List three design goals for a firewall.
Question 11. List four techniques used by firewalls to control access and enforce a security policy.
Question 12. What information is used by a typical packet filtering firewall?
Question 13. What are some weaknesses of a packet filtering firewall?
Question 14. What is the difference between a packet filtering firewall and a stateful inspection firewall?
Question 15. What is an application-level gateway?
Question 16. What is a circuit-level gateway?
Question 17. What are the common characteristics of a bastion host?
Question 18. Why is it useful to have host-based firewalls?
Question 19. What is a DMZ network and what types of systems would you expect to find on such networks?
Question 20. What is the difference between an internal and an external firewall?