a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You
Question:
a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You need to know that the Trivial File Transfer Protocol is a way to download a file from a remote computer without logging in. What do these two records suggest.
21a.) In IDS log files, relevant events are ________.
a. Usually clustered tightly together
b. Usually spread out in the log file
c. Usually only available in log files for individual devices
d. Usually found in the log files of routers
b. After Event 11, there are no more log entries in the IDS log file for Host 60.3.4.5. What does this suggest?
c. If you combine this with what you learned in the first nine records, what do you conclude, at least tentatively?
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko