When clients establish a new connections through Firewall-1, what is the order in which the following steps resolve?
A: NAT the packet.
B: Check the incoming packet against the rule base.
C: Check the inbound packet's IP address for evidence of having been spoofed.
D: Check the outgoing packet against the rule base.
E: The OS routes the packet.
F: Check the outbound packet's IP address for evidence of having been spoofed.
You are configuring your new IDS machine, and are creating new rules. You enter the following rule:
Alert tcp any any -> any 23 (msg: ''Telnet Connection Attempt'';)
What is the effect of this rule?
You are configuring your new IDS machine, and are creating new rules. You enter the following rule:
Alert tcp any any -> 100100/24 any (msg: ''NULL scan detected''; flags: 0;)
What is the effect of this rule?
You are configuring your new IDS machine, and are creating new rules. You enter the following rule:
Alert tcp any any -> 100100/24 (msg: ''O/S Fingerprint detected''; flags: S12;)
What is the effect of this rule?
You have just installed a new Intrusion Detection System in your network. You are concerned that there are functions this system
will not be able to perform. What is a reason an IDS cannot manage hardware failures?
Currently there are no comments in this discussion, be the first to comment!