Based on this information, the following tasks need to be completed:

CORRECT TEXT
The IDS has detected abnormal behavior on this network Click on the network devices to view
device information Based on this information, the following tasks need to be completed:
1. Select the server that is a victim of a SQL injection attack.
2 Select the source of the buffer overflow attack.
3. Modify the access control list (ACL) on the router(s) to ONLY block the buffer overflow attack.
Instructions: Simulations can be reset at any time to the initial state: however, all selections will be deleted.


CORRECT TEXT
The IDS has detected abnormal behavior on this network Click on the network devices to view
device information Based on this information, the following tasks need to be completed:
1. Select the server that is a victim of a SQL injection attack.
2 Select the source of the buffer overflow attack.
3. Modify the access control list (ACL) on the router(s) to ONLY block the buffer overflow attack.
Instructions: Simulations can be reset at any time to the initial state: however, all selections will be deleted.


Answer: See the explanation.

Explanation:
Follow the Steps as
First, we need to determine the source of the attack and the victim. View the IDS logs to determine
this information. Although SIMs may vary, one example clearly shows the source of the attack as
the 10.2.0.50 host, and the victim is serverD.
To block only this traffic we need to modify the following rule on router 2 only:
Source address = 10.2.0.50
Destination address = 192.168.1.0/24
Deny box should be checked.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Syndi

Syndi

what is the source of buffer overflow? Q 349 Q 205
what is the source of SQL injection?
what is the source of XSS?

Thank you