While running snort ids why may there be no alerts

Assignment Help Computer Engineering
Reference no: EM132470

Question

1) While running Snort IDS why may there be no alerts?

2) If we only went to a few web sites, why are there so many alerts?

3) What are advantages of logging more information to the alerts file?

4) What are disadvantages of logging more information to the alerts file?

5) What are advantages of using rule sets from the snort web site?

6) Describe at least one type of rule set you would desire to add to a high level security network and why?

7) If a person with malicious intent were to get into your network and have read or write access to your IDS log or rule set how could they use that information to their advantage?

8) An intrusion prevention system can either wait until it has all of information it needs, or be able to allow packets through based on statistics. What are advantages and disadvantages of each approach?

9) So, "bad guy" decides to do a Denial of Service on your Intrusion Prevention System. At least two things can happen; system can allow all traffic through or can deny all traffic until the system comes back up. What are issues that you must consider in making this design decision?

10) What did you find particularly useful about this lab? What if anything was difficult to follow? What would you modify to make it better?

Reference no: EM132470

Questions Cloud

What is the npv if the discount rate is 15.30% : What is the NPV if the discount rate is 15.30% and Evaluate Capital's after-tax WACC
Examine how computer forensics investigations pertain to law : Examine how computer forensics investigations pertain to law
Describe what he must do to obtain the same cash flow : Describe what he must do to obtain the same cash flow as he could have gotten from investing in 1000 shares in the proposed levered firm
Describe the principles of dilution ventilation : Describe the principles of Dilution Ventilation and Local Exhaust Ventilation
While running snort ids why may there be no alerts : While running Snort IDS why may there be no alerts
What is capitals after-tax wacc : what is Capital's after-tax WACC and what balance could appear in the investment in Holister account as of December 31, 2009?
Write a function called is_anagram : Write a function called is_anagram.
The two classes of glare that employees may encounter : a) Describe briefly the two classes of glare that employees may encounter in their work environment due to poor quality of lighting b) The Fan Laws define the relation of volume flow, pressure and power against the fan speed. How does the volum..
What can be the effect of the price increase : What can be the effect of the price increase on the firm's FCF for the year?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd