Question: 2. How can attacker use reconnaissance to launch attack? Provide ONE (1) suitable example to support your answer. (4 Marks) Your answer: 3. Intrusion Detection



2. How can attacker use reconnaissance to launch attack? Provide ONE (1) suitable example to support your answer. (4 Marks) Your answer: 3. Intrusion Detection System (IDS) is refers to the devices that inspect data communication flows to identify patterns that may indicate that hacking is underway. a) IDS perform a variety of security functions. List FIVE (5) of them. (5 Marks) Your answer: b) Why host IDS is considered as passive detection approach? (2 Marks) Your answer: c) IDS can be network based or host based. Do we need to apply both? Why? (3 Marks) d) Suggest TWO (2) ways on how IDS can be used by system administrator to improve security in an organization. (4 Marks) Your answer: 4. Cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. a) Describe any FOUR (4) types of cookie that you know. (8 Marks) Your answer: b) Provide any THREE (3) ways on how to avoid sniffer to steal the cookie. (6 Marks) Your
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
