6. [5 points] Describe one advantage and disadvantage of using a rule-based intrusion detection system over...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
6. [5 points] Describe one advantage and disadvantage of using a rule-based intrusion detection system over a statistical-based one. 7. [5 points] Can VPNs (Virtual Private Networks) provide confidentiality, integrity and authentication? Briefly explain why or why not. 8. [5 points] Briefly explain how ARP spoofing is accomplished and the impact it can have. 9. [5 points] Why are techniques like IP Traceback necessary to help determining the true origins of DDOS attacks featuring spoofed IP addresses? 10. [5 points] What information is needed for an attacker carry out a successful TCP reset attack? Recall that this is an attack where a fake packet is sent with the RST bit set to 1 to kill an established TCP session. 11. [5 points] Can a stateless firewall enforce a policy of blocking all TCP initiation requests from any external host, but allow TCP connection requests from any internal host to any external host, and also allow returning traffic on these connections initiated by internal hosts? Provide any necessary assumptions required. 6. [5 points] Describe one advantage and disadvantage of using a rule-based intrusion detection system over a statistical-based one. 7. [5 points] Can VPNs (Virtual Private Networks) provide confidentiality, integrity and authentication? Briefly explain why or why not. 8. [5 points] Briefly explain how ARP spoofing is accomplished and the impact it can have. 9. [5 points] Why are techniques like IP Traceback necessary to help determining the true origins of DDOS attacks featuring spoofed IP addresses? 10. [5 points] What information is needed for an attacker carry out a successful TCP reset attack? Recall that this is an attack where a fake packet is sent with the RST bit set to 1 to kill an established TCP session. 11. [5 points] Can a stateless firewall enforce a policy of blocking all TCP initiation requests from any external host, but allow TCP connection requests from any internal host to any external host, and also allow returning traffic on these connections initiated by internal hosts? Provide any necessary assumptions required.
Expert Answer:
Answer rating: 100% (QA)
Question 6 Answer Rulebased Versus Statisticalbased IDS Advantage RuleBased Advantage Clear deterministic rules for known threats Disadvantage May str... View the full answer
Related Book For
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill
Posted Date:
Students also viewed these programming questions
-
How Does your business association enable you to easily raise capital?Why or why not? Explain how easy is it for the owners of the company to transfer their ownership? If one of the owners dies, what...
-
What is one advantage and disadvantage of using a pie chart, bar graph, dot plot, stem and leaf diagram, histogram?
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
The Best Buy Co. Inc. 10-K report has the following footnote related to leasing activities. The future minimum lease payments under our capital and operating leases by fiscal year (not includ- ing...
-
Air, at stagnation conditions of 450 K and 250 kPa, flows through a nozzle. At section 1, where the area = 15 cm2, there is a normal shock wave. If the mass flow is 0.4 kg/s, estimate (a) The Mach...
-
Let u and v be vectors in an inner product space V. If ((u - v), (u + v)) = 0, Show that ||u|| = ||v||.
-
Search the Internet to identify three or more companies marketing die attach adhesives. For example, check 3M and Henkel.
-
Scripps Health is a long-standing and prominent nonprofit health-based organization that is based in the greater San Diego area. The organization experienced a severe financial downturn that led to...
-
(1 point) A cryptography student has accidentally used the same keystream to encrypt two different messages, M and M2. We know that the ciphertexts are C 0x06c6d00e4633400a and C2 =...
-
Complete Alvins Music Inc.s (AMI) 2020 Form 1120, Schedule D, and Schedule G (if applicable) using the information provided below. Neither Form 4562 for depreciation nor Form 4797 for the sale of...
-
What hemisphere receives the most lightning strikes in January? Southern Northern Western Eastern Tropical cyclones in the northern hemisphere rotate ____________ counterclockwise clockwise You are...
-
Lucys parents placed $5,000 in a bank account at 3% interest compounded quarterly upon her 10th birthday. Hunter earned $15,000 working and placed it in a bank account upon his 16th birthday. His...
-
A Supermarket Megamerger Will Redefine What You Buy at the Grocery Store Kroger and Albertsons want to merge in a $20 billion deal. If antitrust regulators approve, the definition of a grocery store...
-
Using this video answer the following questions https://www.youtube.com/watch?v=oet62-F2Q9c 1. Using examples either from the video or your own research, what are some ways in which the American...
-
Pinnacle Plastics Products (PPP) need to make a choice between gas-powered and electric-powered forklifts. Gas-powered forklifts have an initial cost of $21,500, an AOC of $550, and can be sold for...
-
The "depreciation tax shield" measures a company's tax savings, in a given year, from being able to deduct depreciation expenses from taxable income (i.e., the amount that your total taxes decrease...
-
P invested 5000 per month for 6 months of a year and Q investedx per month for 8 months of the year in a partnership business. The profit is shared in proportion to the total investment made in that...
-
Write a while loop that uses an explicit iterator to accomplish the same thing as Exercise 7.3. Exercise 7.3. Write a for-each loop that calls the addInterest method on each BankAccount object in a...
-
Harold Conners (Social Security number 785-23-9873) lives at 13234 DeMilo Drive, Houston, TX 77052, and is self-employed for 2012. He estimates his required annual estimated tax payment for 2012 to...
-
On September 14, 2012, Jay purchased a passenger automobile that is used 75 percent in his accounting business. The automobile has a basis for depreciation purposes of $35,000, and Jay uses the...
-
During 2012, William purchases the following capital assets for use in his catering business: New passenger automobile (September 30)........................$21,500 Baking equipment (June 30)...
-
What are the three main considerations involved in managing subcontractors?
-
Why is float a valuable resource, and why is free float more valuable than total float?
-
Describe the situation for which but-for or collapsed as-built analysis is most appropriate.
Study smarter with the SolutionInn App