COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Buffer overflows
|
|
Unexpected combinations and unhandled input
|
|
Race conditions
|
|
All of the mentioned
|
Detailed explanation-1: -IDS can be classified by where detection takes place (network or host) or the detection method that is employed (signature or anomaly-based).
Detailed explanation-2: -What are the different ways to classify an IDS? a) anomaly detection. b) signature based misuse. c) stack based. d) all of the mentioned.
Detailed explanation-3: -Asymmetric Routing. In this method, the attacker attempts to utilize more than one route to the targeted network device. Buffer Overflow Attacks. Common Gateway Interface Scripts. Protocol-Specific Attacks. Traffic Flooding. Trojans. Worms. 25-Dec-2014
Detailed explanation-4: -Network intrusion detection system. Host-based intrusion detection system. Perimeter intrusion detection system. VM-based intrusion detection system.