Chapter 7
2. How does a false positive alarm differ from a false negative alarm? From a security perspective, which is less desirable?
3.
How does a network-based IDPS differ from a host-based IDPS?
14.
What is an open port? Why is it important to limit the number of open ports to those that are absolutely essential?
Chapter 8
3.
What is a cryptographic key, and what is it used for? What is a more formal name for a cryptographic key?
4.
What are the three basic operations in cryptography?
9.
What are the components of PKI?