Question: a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You need to know that the Trivial File Transfer

a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You need to know that the Trivial File Transfer Protocol is a way to download a file from a remote computer without logging in. What do these two records suggest.

21a.) In IDS log files, relevant events are ________.

a. Usually clustered tightly together

b. Usually spread out in the log file

c. Usually only available in log files for individual devices

d. Usually found in the log files of routers


b. After Event 11, there are no more log entries in the IDS log file for Host 60.3.4.5. What does this suggest?

c. If you combine this with what you learned in the first nine records, what do you conclude, at least tentatively?

Step by Step Solution

3.39 Rating (161 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a 10 8490830 Packet from 60345 to 123285210 TFTP request FIREWALL 11 8491259 Series of packets from ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!