What is compensation of using rule sets

Assignment Help Computer Engineering
Reference no: EM132996

Question

1. When running Snort IDS why valour there is no alerts?

2. If we only went to a few web sites, why are there so many alerts?

3. What is compensation of logging more information to the alerts file?

4. What is disadvantage of logging more information to the alerts file?

5. What is compensation of using rule sets from the snort web site?

6. Describe at least one type of rule set you would want to add to a high level security network and give reasons?

7. If a person with malicious intent were to get into your network and have read or write access to your IDS log or rule set how could they use that information to their advantage?

8. An intrusion prevention system is able to either wait until it has all of the information it needs, or can allow packets through based on statistics (guessed or previously known facts). What is advantage and disadvantage of each approach?

9. So, the "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; the system can agree to all traffic through (without being checked) or can deny all traffic until the system comes back up. What are the factors that you should consider in making this design decision?

10. What did you find mainly useful about this lab (please be specific)? What if anything was difficult to follow? What would you vary to make it better?

Reference no: EM132996

Questions Cloud

Discuss the importance of organisational culture : Discuss the importance of organisational culture for effective organisational performance. Support your answer with relevant industry examples
Classify traditional grade school algorithms : Classify traditional grade school algorithms
Analyze running time of algorithm : Analyze running time of algorithm
Explain briefly how electronic money works : Explain briefly how electronic money works. Give two benefits of e-money to each of the following-
What is compensation of using rule sets : What is compensation of using rule sets
What are the roles of the management sponsors : What are the roles of the management sponsors
Illustrate the constraint graph : Illustrate the constraint graph
How to find the number of characters in a string : How to find the number of characters in a string
Explain how you would carry out an effective interview : Elaborate on the steps that are needed to develop effective questionnaires Explain how you would carry out an effective interview

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a database for the company

Create a database for the company.

  How the project management life cycle be efficient

How the Project Management Life Cycle be efficient.

  What are disadvantages of low class

What are disadvantages of low class What are advantages of high value?

  Spreadsheet model of the heat transfer situation

Spreadsheet model of the heat transfer situation

  What aspects of environment support structure of colleges

What aspects of environment support structure of colleges.

  Library management system

Prepare a module which can exhibit the Library Management System

  Program on strings s1 and s2

Program on strings s1 and s2.

  What is mno

What is MNO.

  What will be the list assumptions for the scope of project

What will be the list assumptions for the scope of project? Give detailed and measurable non functional requirements.

  The difference between roles and groups

The difference between roles and groups

  Explain networking of cis 505

Explain networking of CIS 505? 1. Network Neutrality 2. Web2.0

  What is meant by user cantered design

What is meant by ‘user cantered design'

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd