While running snort ids why may there be no alerts

Assignment Help Computer Engineering
Reference no: EM132470

Question

1) While running Snort IDS why may there be no alerts?

2) If we only went to a few web sites, why are there so many alerts?

3) What are advantages of logging more information to the alerts file?

4) What are disadvantages of logging more information to the alerts file?

5) What are advantages of using rule sets from the snort web site?

6) Describe at least one type of rule set you would desire to add to a high level security network and why?

7) If a person with malicious intent were to get into your network and have read or write access to your IDS log or rule set how could they use that information to their advantage?

8) An intrusion prevention system can either wait until it has all of information it needs, or be able to allow packets through based on statistics. What are advantages and disadvantages of each approach?

9) So, "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; system can allow all traffic through or can deny all traffic until the system comes back up. What are issues that you must consider in making this design decision?

10) What did you find particularly useful about this lab? What if anything was difficult to follow? What would you modify to make it better?

Reference no: EM132470

Questions Cloud

What is the npv if the discount rate is 15.30% : What is the NPV if the discount rate is 15.30% and Evaluate Capital's after-tax WACC
Examine how computer forensics investigations pertain to law : Examine how computer forensics investigations pertain to law
Describe what he must do to obtain the same cash flow : Describe what he must do to obtain the same cash flow as he could have gotten from investing in 1000 shares in the proposed levered firm
Describe the principles of dilution ventilation : Describe the principles of Dilution Ventilation and Local Exhaust Ventilation
While running snort ids why may there be no alerts : While running Snort IDS why may there be no alerts
What is capitals after-tax wacc : what is Capital's after-tax WACC and what balance could appear in the investment in Holister account as of December 31, 2009?
Write a function called is_anagram : Write a function called is_anagram.
The two classes of glare that employees may encounter : a) Describe briefly the two classes of glare that employees may encounter in their work environment due to poor quality of lighting b) The Fan Laws define the relation of volume flow, pressure and power against the fan speed. How does the volum..
What can be the effect of the price increase : What can be the effect of the price increase on the firm's FCF for the year?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How can a relation be organized in mass storage

How can a relation be organized in mass storage.

  How to store ten floating-point values into vector

How to store ten floating-point values into vector. Write down a program that declares a vector of ten floating-point values

  Procedure to generate indexes for foreign keys

Procedure to generate indexes for foreign keys.

  How to create a set in third normal

How to create a set in third normal RESERVATION(reservation id, date of reservation, start date, end date, (( customer id, customer name, customer address, customer type, customer type description, ((customer preferences)), customer credit card n..

  Calculate the component voltages

Input voltage will be a step voltage that is 0 volt before time t = 0 and V in

  What will do to get deadline to receive a passing grade

What will do to get deadline to receive a passing grade? You have to complete and submit course project previous to the deadline to receive a passing grade for this course.

  What security measures required to address vulnerabilities

What security measures required to address vulnerabilities Illustrate threats and vulnerabilities that are possible after implementing "big data" technologies in online auctioning company.

  How to set a rule that used by snort to detect an ack scan

How to set a rule that used by snort to detect an ACK scan What do you think Bro can do a better job detecting an ACK scan?

  Explain the reason for the project development

Two members of your project development team are differing about relative significance of training and documentation.

  Problem on encryption using a one-round version of des

Problem on encryption using a one-round version of DES.

  What devices use to get efficient network communication

CNT Books has expanded considerably as you first got network up and running three years ago. It at the present occupies an entire floor in building, and its LAN has full-grown to contain several servers and more than 60 workstations.

  Illustrate precedence graph

Illustrate precedence graph

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd