a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You

Question:

a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You need to know that the Trivial File Transfer Protocol is a way to download a file from a remote computer without logging in. What do these two records suggest.

21a.) In IDS log files, relevant events are ________.

a. Usually clustered tightly together

b. Usually spread out in the log file

c. Usually only available in log files for individual devices

d. Usually found in the log files of routers


b. After Event 11, there are no more log entries in the IDS log file for Host 60.3.4.5. What does this suggest?

c. If you combine this with what you learned in the first nine records, what do you conclude, at least tentatively?

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: