week 2
docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
515
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
2
Uploaded by patchoulli
1.
Low budgets
2.
Threshold monitoring(setting up parameter for acceptable use
3.
It should be blocked because such traffic is often used to do port scans and flood attacks
4.
SPI/application gateway hybrid(check point
5.
Anomaly detection (ids is the cisco sensor)
6.
AES and 3DES
7.
Circuit level gateway(private virtual connection)
8.
It examines the source IP of all packets
9.
Proxy server
10.
Low cost
11.
Review firewall logs
12.
Built in IDS(d-link 2560
13.
Executable profiling(how apps use rresources
14.
Multiple operating systems
15.
It is inexpensive or free
16.
Built in NAT(PC firewalls
17.
Intrusion deflection(attract intruders
18.
Honeypot
19.
Unbiased information might be hard to find
20.
Its authentication method takes more time and resources
21.
It hides internal network addresses
22.
A port scan
23.
Stateful packet inspection(Sonicwall TZ)
24.
Proxy server
25.
Intrusion deterrence (appear less appealing
26.
A visual tool to track attacks(McAfee
27.
Screened host (combo firewalls
28.
Banishment vigilance(preemptive blocking
29.
Extensive training available on the product
30.
Application gateway(authorixed to connect)
31.
Packet filtering (snort
32.
Windows 2000 internet connection firewall
33.
It yields many false positives
34.
Vulnerabilty scanning (not in ICF
35.
Router based(preconfigured)
36.
Host based(snort
37.
Packet filter, app gateway, circuit level, stateful packet inspection
38.
Router-based (check point 50000
39.
Skilled tech personel are available
40.
Stateful packet inspection (most secure)
41.
Intrusion detection system
42.
It requires client side configs
43.
They should unless she is running a web server on her machine
44.
It examines each packet in the context of previous packets
45.
It might fascinate hackers and keep them online long enough to catch them
46.
Ptotocol type, source port, destination port, source ip
47.
System monitoring (not a profiling strategy 48.
Operating system securitynflaws
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help