Question: 2. How can attacker use reconnaissance to launch attack? Provide ONE (1) suitable example to support your answer. (4 Marks) Your answer: 3. Intrusion Detection

 2. How can attacker use reconnaissance to launch attack? Provide ONE(1) suitable example to support your answer. (4 Marks) Your answer: 3.Intrusion Detection System (IDS) is refers to the devices that inspect data

2. How can attacker use reconnaissance to launch attack? Provide ONE (1) suitable example to support your answer. (4 Marks) Your answer: 3. Intrusion Detection System (IDS) is refers to the devices that inspect data communication flows to identify patterns that may indicate that hacking is underway. a) IDS perform a variety of security functions. List FIVE (5) of them. (5 Marks) Your answer: b) Why host IDS is considered as passive detection approach? (2 Marks) Your answer: c) IDS can be network based or host based. Do we need to apply both? Why? (3 Marks) d) Suggest TWO (2) ways on how IDS can be used by system administrator to improve security in an organization. (4 Marks) Your answer: 4. Cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. a) Describe any FOUR (4) types of cookie that you know. (8 Marks) Your answer: b) Provide any THREE (3) ways on how to avoid sniffer to steal the cookie. (6 Marks) Your

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!