Part 1: Concepts From Module ReadingAnswer and provide a brief explanation (30–50 words) and include at minimum of 1 scholarly source cited in APA format for each of the following five questions.A...




Part 1: Concepts From Module Reading




Answer and provide a brief explanation (30–50 words) and include at minimum of 1 scholarly source cited in APA format for each of the following five questions.







  1. A ____________________ is a generic type of scan in which an attacker attempts to locate ports opened by a Trojan by scanning ports 0–65,535.



  2. True or False: An attacker might choose to limit the speed at which they attack a network in order to avoid detection.



  3. __________, which are TCP packets with no flags set, can be sent by an attacker to attempt to crash a server.



  4. The ____________________ is used to set the largest sized packet that can be transmitted on a network. Larger packets than this number will be fragmented.



    1. IP address



    2. Maximum Transmission Unit (MTU)



    3. IP protocol number









  5. What type of attack might the Nemesis tool be used for?



    1. Packet injection



    2. Path obfuscation



    3. CGI script exploitation












Part 2:Signatures and Actions







  1. Signatures fall into one of the following two categories: Atomic signatures and stateful signatures. Describe each and include at minimum of 1 scholarly source cited in APA format. (100–200 words each)



  2. There are three types of signature triggers. Describe each and include at minimum of 1 scholarly source cited in APA format. (100–200 words each)






Part 3:Network Traffic Signatures







  1. Distinguish normal traffic signatures from abnormal traffic signatures. Include at minimum of 1 scholarly source cited in APA format (Minimum 300 words total)






Part 4:Detection and Prevention Capabilities







  1. You want to deploy a wireless intrusion detection system. What tool would you use and why? (Minimum 300 words total)Include at minimum of 1 scholarly source cited in APA format



  2. Most intrusion detection and prevention systems support multiple detection capabilities. Distinguish each of the following: Thresholds, blacklists, whitelists, and alert settings. (Minimum 300 words total) Include at minimum of 1 scholarly source cited in APA format






Assessment Requirements




Answers contain sufficient information and supporting references to adequately answer the questions and contain no spelling, grammar, or APA errors. For more information on APA style formatting, go to Academic Writer under Academic Tools of this course.







  • include a title page.



  • be double-spaced.



  • be typed in Times New Roman, 12 -point font; and



  • be free of spelling or punctuation errors.



  • A separate page at the end of your submission should contain a list of references in APA format. Use your textbook, the Library, and the internet for research.



  • Be sure to include references for all sources and to cite them using in-text citations where appropriate. Your sources and content should follow current APA citation style.



Feb 16, 2023
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here