Reference no: EM133255525
Provide answers to the following questions. Don't just provide a Yes/No answer, provide some facts to back up your decision. Site all the sources
1. What is an IDS and WHY do we need one?
2. What are indicators of Compromise? How can IDS rules support detection?
3. Describe the difference between an IDS and an IPS. Compare and contrast Wazuh and Snort. Can either be used to support IPS functions? If so, how?
4. What considerations are needed when placing your IDS/IPS in the network topology? For example, should it be on the Public Side of the Firewall, ie: between the bad stuff (internet) and your incoming firewall? Why?
5. What pros and cons can you think of when deciding to build your own IDS/IPS with Open Source offerings? Do you think it is cheaper, in the long run, to build your own or outsource to a managed service provider?
6. What is Suricata and its capabilities? How do Suricata's capabilities compare with similar tools that we've explored?
7. What is a SIEM? Compare and contrast what we were able to do with Kibana versus what we are doing with Splunk.
Major distributor of microcomputer equipment
: Find a catalog or visit the Website of a major distributor of microcomputer equipment, such as Computer Discount Warehouse or Dell. Select or configure a system
|
What parties were harmed by the trade war with china
: In response, China cut their imports of U.S. soybeans and lobsters. What parties were harmed by the trade war with China?
|
What impression of arab culture emerge from this sura
: What impression of Arab culture emerge from this sura? What does the litany of unlikely or mystical events reveal about the values of Muhammad's contemporaries
|
Find threat to corporate networks
: Why are network printers, scanners, copiers, (aka multifunction devices) a threat to corporate networks? How can they be used by malicious people?
|
What are indicators of compromise
: Provide answers to the following questions. Don't just provide a Yes/No answer, provide some facts to back up your decision. Site all the sources
|
What will the price the customer pay for the loudspeaker
: A shop sells a speaker for NOK 8,000 ex. VAT. The VAT on the loudspeaker is 25%. What will the price the customer pay for the loudspeaker?
|
Connection to the main office in mississauga
: Office ABCD has 200 endpoints, a hybrid server (17 in-house servers and 21 cloud applications) and has a constant need to have a VPN connection to the main offi
|
Http request smuggling
: Research and discuss a recent example on one of the following attacks: brute-force, buffer overflow, content spoofing, credential/session prediction, cross-site
|
Employment may occur at same time as a rise in unemployment
: Explain how a rise in employment may occur at the same time as a rise in unemployment.
|