The section contains computer network questions and answers on point to point protocol & error detection, a TCP/IP protocol that is used to connect one computer system to another and computers use PPP to communicate over the telephone network or the Internet. A PPP connection exists when two systems physically connect through a telephone line.
Which of the following is an advantage of anomaly detection?
One of the most obvious places to put an IDS sensor is near the firewall. Where exactly in relation to the firewall is the most productive placement?
What is the purpose of a shadow honeypot?
At which two traffic layers do most commercial IDSes generate signatures?
IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
Which of the following is used to provide a baseline measure for comparison of IDSes?
When discussing IDS/IPS, what is a signature?
“Semantics-aware” signatures automatically generated by Nemean are based on traffic at which two layers?
Which of the following is true of signature-based IDSes?
Your company has a LAN in its downtown office and has now set up a LAN in the manufacturing plant in the suburbs. To enable everyone to share data and resources between the two LANs, what type of device(s) are needed to connect them? Choose the most correct answer.
A false positive can be defined as ________.
An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior
An alert that indicates nefarious activity on a system that is not running on the network
The lack of an alert for nefarious activity
Both An alert that indicates nefarious activity on a system that, upon further inspection, turns out to represent legitimate network traffic or behavior and An alert that indicates nefarious activity on a system that is not running on the network
Which of the following is not a disadvantage of wireless LAN?
Slower data transmission
Higher error rate
Interference of transmissions from different computers
All of the above
The Internet Control Message Protocol (ICMP),
Allows gateways to send error a control messages to other gateways or hosts
Provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another
Reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem
All of the above
None of the above
Which of the following is used for modulation and demodulation?
Modem
Protocols
Gateway
Multiplexer
None of the above
The term duplex refers to the ability of the data receiving stations to echo back a confirming message to the sender. In full duplex data transmission, both the sender and the receiver,
Cannot talk at once
Can receive and send data simultaneously
Can send or receive data one at a time
Can do one way data transmission only
None of the above