Part III Short Answer Questions. Who are misfeasors? Give some examples of their intrusion. There are two
Fantastic news! We've Found the answer you've been seeking!
Question:
Part III Short Answer Questions.
- Who are misfeasors? Give some examples of their intrusion.
- There are two ways to protect a password file, what are they? Explain.
- With regards to intrusion detection, explain these terminologies:
- True positive
- False positive
- True negative
- False negative
- What is statistical anomaly detection?
- What is rule-based Intrusion detection?
- What are honeypots?
- What are the uses of them?
- Give three possible locations to deploy them, also explain advantages and disadvantages of placing them in each of the three locations.
- What is the difference between "reactive" and "proactive" password checking?
- What is the purpose of using "salt" in the context of UNIX password management?
- What is the different between packet filtering firewall and stateful inspection packet firewall?
- Explain the personal firewall in a home environment.
- Explain distributed firewalls.
- Where can the firewalls be placed? Why are they placed there?
Related Book For
Posted Date: