Question: Network Security ( HW# 3 ) Question 1 . Complete the following sentences. IDS uses known pattern matching to signify attack [ Signature - based
Network Security HW#
Question Complete the following sentences.
IDS uses known pattern matching to
signify attack
Signaturebased Anomalybased Hostbased Networkbased
IDS cannot detect attacks for which it
has no signature
Signaturebased Anomalybased Hostbased Networkbased
IDS uses statistical model or machine
learning engine to characterize normal usage behaviors.
Signaturebased Anomalybased Hostbased Networkbased
IDS Can detect attempts to exploit new
and unforeseen vulnerabilities
Signaturebased Anomalybased Hostbased Networkbased
IDS examines raw packets in the
network passively and triggers alerts
Signaturebased Anomalybased Hostbased Networkbased
IDS can analyze audittrails, logs
integrity of files and directories on a single host
Signaturebased Anomalybased Hostbased Networkbased
Question Mark the following statements as true or false.
Coordinated DoS attack is harder to deal with compared to Simple
DoS attack.
In Simple DoS attack, the Attacker usually spoofed source address to
hide origin.
In Distributed DoS attacks, the handlers are usually home users with
DSLCable
In Distributed DoS attacks, the agents are usually very high volume
servers.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
