Reference no: EM131320849
Lab Questions
1. When running Snort IDS why might there be no alerts?
2. If we only went to a few web sites, why are there so many alerts?
3. What are the advantages of logging more information to the alerts file?
4. What are the disadvantages of logging more information to the alerts file?
5. What are the advantages of using rule sets from the snort web site?
6. Describe (in plain English) at least one type of ruleset you would want to add to a high level security network and why?
7. If a person with malicious intent were to get into your network and have read/write access to your IDS log or rule set how could they use that information to their advantage?
8. An intrusion prevention system can either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What are the advantages and disadvantages of each approach?
9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen, the system can allow all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you must consider in making this design decision?
10. What did you find particularly useful about this lab (please be specific)? What if anything was difficult to follow? What would you change to make it better?
How it compares to what was being done before
: Consider what you have learned in class this semester. Take one of those concepts and apply it to your every day life. This could include something you do at work or in service to the community. Write a 5 page paper that follows the basic outline ..
|
New-product strategy development stage
: Describe in your own words the new-product strategy development stage in the new-product process? What are the main sources of new-product ideas?
|
Global market entry strategy would be best
: 1. If Starbucks wants to enter the Cuban market which global market entry strategy would be best? Why would you choose that particular strategy?
|
Is it also valid for computing the hole concentration
: When the Boltzmann approximation is valid for computing the electron concentration, is it also valid for computing the hole concentration? Give two examples, one showing the true and the other, the false answer.
|
What are advantage of logging more information to alert file
: What are the advantages of logging more information to the alerts file? What are the disadvantages of logging more information to the alerts file? What are the advantages of using rule sets from the snort web site?
|
Information on various job openings
: Go to various different websites to find information on various job openings within the field of sales. At least three of these need to be business to business type sales jobs.
|
Are you predicting that you will obtain an interaction
: What main effects and interaction could you test with the design you developed for Question 3? Are you predicting that you will obtain an interaction?
|
Compare holism systems thinking versus reductionism
: This research paper will compare and contrast Holism (Systems Thinking) versus Reductionism. The research paper must be submitted using Safe Assign.
|
Outline an anti-fraud program
: Outline an anti-fraud program that you would implement at your company (current or previous). Suggest the approach you would take to sell this program to your senior executives. Provide a rationale for your response.
|