Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 Border Routers can detect out-of-band communications such as GSM sign

ID: 3708387 • Letter: Q

Question

Question 1

Border Routers can detect out-of-band communications such as GSM signals.

True

False

Question 2

If I wanted to place an IDS on my network so that it could see the most amount of traffic, I would:

Place it right in front of the suspected compromised host.

Place it on any port of a local switch.

Find the closest place to the gateway of my network and use a network tapping device.

IDSs are not used for this role.

Question 3

In most cases, which of the following methods would you NOT want to use with an IDS:

SPAN port

Network Tap

Network Hub

An unconfigured switch port  

Question 4

Intrusion Prevention Systems (IPS) are largely passive devices.

True

False

Question 5

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

True

False

Question 6

Deep Packet Inspection only looks at payload data.

True

False

Explanation / Answer

1)Answer:

True

Explanation:

Border Routers can detect out-of-band communications such as GSM signals.

2)Answer:

Place it on any port of a local switch.

Explanation:

If I wanted to place an IDS on my network so that it could see the most amount of traffic, I would Place it on any port of a local switch.  

4)Answer:

True

Explanation:

An IPS is an active and real-time device unlike an intrusion detection system, which is not inline and is a passive device

5)Answer:

True

Explanation;

Internet radio probably uses UDP because it is a connection-less protocol and streaming media typically does not require an established connection.

6)Answer:

False

Explanation:

Deep Packet Inspection (DPI) looks at not only the header and footer of a packet, but also examines the data part (content) of the packet searching for illegal ... packets, examining thepayload (data), comparing that data with defined criteria, and then re-assembles the packet for transmission (or rejection)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote