Questionwhen running snort ids why may there be no alertsif

Assignment Help Computer Engineering
Reference no: EM13349507

Question

When running Snort IDS why may there be no Alerts?

If we only went to a few web sites, why are there so several alerts?

What are benefits of logging more information in the alerts file

what the drawback of logging more information in the alerts file

what is the gain of using rule sets for Snort web site?

Explain in plain English at least one type of ruleset you would want to add a high level security network and why with reason?

If a person with malicious intent were to get to your network and have read or write access to your IDS log how might they use that information to their advantage
An intrusion prevention system be able to either wait until it has all of the information it needs, or be able to allow packets throughout based on statistics (guess or previously known facts) what are advantages and disadvantages of each approach?

So, bad guy decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; the system can permit all traffic through (without being check) or be able to deny all traffic until the system comes back up. What are the factors that you must consider in making this design choice?

What did you find particularly useful about this lab (please be specific)? What if anything was complex to follow? What would you change to create it better?

Reference no: EM13349507

Questions Cloud

Questionassume you want to deposit a certain amount of : questionassume you want to deposit a certain amount of money into a saving account and then leave it alone to draw
Question 1 a portion of the net fixed manufacturing : question 1. a portion of the net fixed manufacturing overhead cost incurred throughout a period cana. be excluded from
Question1 prove that it is impossible to extend a : question1. prove that it is impossible to extend a comparison-based implementation of the priority queue adt in which
Question hungry and feed foundation is a non-profit : question hungry and feed foundation is a non-profit organization that has a cost of capital of 10 . the foundation is
Questionwhen running snort ids why may there be no alertsif : questionwhen running snort ids why may there be no alerts?if we only went to a few web sites why are there so several
Question the john clock shop manufactures clocks on a : question the john clock shop manufactures clocks on a highly automated assembly line. its costing system use two cost
Questiontranslate the following c program to mips : questiontranslate the following c program to mips assembly.int fibint nif n 0 return 0 else if n 1 return 1 else
Question currently moodys investors services issued a : question currently moodys investors services issued a special comment explain best practices for the role of audit
Questiongenerate an er model for each of following : questiongenerate an er model for each of following descriptions-a a large organization has some parking lots that are

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd