Question: a) What packets are usually logged in log files? b) What are the fields in the log file shown in Figure 6-25? c) In the

a) What packets are usually logged in log files?
b) What are the fields in the log file shown in Figure 6-25?
c) In the examples given, by what field was the log file sorted?
d) From the log file, what could we infer about the Echo probe attack?
e) Did this attack seem to be serious? Explain.
f) From the log file, what could we infer about the FTP attack?
g) Did this attack seem to be serious? Explain.
h) Why was the dropping of a single packet because of lack of firewall capacity a cause for concern?
i) What cannot be determined if log files cover too short a period of time?
j) Why is it difficult for a log file to cover a long period of time?
k) What is the advantage of logging all packets passing through a firewall?
l) Why is logging all packets problematic?

Step by Step Solution

3.51 Rating (175 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a Dropped packets from firewalls are usually logged in log files b ID number for the packet dropping event Time The time the packet arrived at the fir... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

883-C-S-S-A-D (2944).docx

120 KBs Word File

Students Have Also Explored These Related Systems Analysis And Design Questions!