Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Exploration of Intrusion Detection Systems Lab Assignment 2 Prepared for: Professor Thomas Richardson Cyber Security 630 Prepared by: Gabriel Daniels...
You are to include your answers for each the following 10 questions in a Worddocument and submit the file in your WebTycho Gradebook Lab 2 Assignmentfolder. Each question is worth 10 points.1. When running Snort IDS why might there be no alerts?2. If we only went to a few web sites, why are there so many alerts?3. What are the advantages of logging more information to the alerts file?4. What are the disadvantages of logging more information to the alerts file?5. What are the advantages of using rule sets from the snort web site?6. Describe (in plain English) at least one type of ruleset you would want to add to a high level securitynetwork and why?Page 187. If a person with malicious intent were to get into your network and have read/write access to yourIDS log or rule set how could they use that information to their advantage?8. An intrusion prevention system can either wait until it has all of the information it needs, or canallow packets through based on statistics (guessed or previously known facts). What are theadvantages and disadvantages of each approach?9. So, the “bad guy” decides to do a Denial of Service on your Intrusion Prevention System. At leasttwo things can happen, the system can allow all traffic through (without being checked) or can deny alltraffic until the system comes back up. What are the factors that you must consider in making thisdesign decision?10. What did you find particularly useful about this lab (please be specific)? What if anything wasdifficult to follow? What would you change to make it better?