Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Answer True/False for the following statements related to IDS and Firewall: (i)

ID: 664351 • Letter: A

Question

Answer True/False for the following statements related to IDS and Firewall:

(i) Some stateful firewalls keep track of TCP sequence numbers. ____

(ii) A packet filter firewall creates a directory for each of the connections. ____

(iii) TCP SYN attack can be detected by anomaly detection approach. ____

(iv) The unusual combination of TCP flags can be detected by anomaly detection approach ____

(v) A TCP packet having an acknowledgement value set to a non-zero number, but keeping the acknowledgment flag as zero is an example of an attack that should be detected by host-based IDS. ____

(vi) Snort is an example of anomaly-based IDS. ___

(vii) An active IDS can proactively stops ongoing malicious activities if configured. ___

(viii) Excessive usage of network bandwidth usage is a symptom that can be detected by Firewall. ___.

Explanation / Answer

i) Some stateful firewalls keep track of TCP sequence numbers. TRUE

(ii) A packet filter firewall creates a directory for each of the connections.TRUE

(iii) TCP SYN attack can be detected by anomaly detection approach. TRUE

(iv) The unusual combination of TCP flags can be detected by anomaly detection approach FALSE

(v) A TCP packet having an acknowledgement value set to a non-zero number, but keeping the acknowledgment flag as zero is an example of an attack that should be detected by host-based IDS. TRUE

(vi) Snort is an example of anomaly-based IDS. FALSE

(vii) An active IDS can proactively stops ongoing malicious activities if configured. TRUE

(viii) Excessive usage of network bandwidth usage is a symptom that can be detected by Firewall. TRUE

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote