COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are the different ways to intrude?
A
Buffer overflows
B
Unexpected combinations and unhandled input
C
Race conditions
D
All of the mentioned
Explanation: 

Detailed explanation-1: -IDS can be classified by where detection takes place (network or host) or the detection method that is employed (signature or anomaly-based).

Detailed explanation-2: -What are the different ways to classify an IDS? a) anomaly detection. b) signature based misuse. c) stack based. d) all of the mentioned.

Detailed explanation-3: -Asymmetric Routing. In this method, the attacker attempts to utilize more than one route to the targeted network device. Buffer Overflow Attacks. Common Gateway Interface Scripts. Protocol-Specific Attacks. Traffic Flooding. Trojans. Worms. 25-Dec-2014

Detailed explanation-4: -Network intrusion detection system. Host-based intrusion detection system. Perimeter intrusion detection system. VM-based intrusion detection system.

There is 1 question to complete.