- Discuss how the classless inter domain routing (CIDR) paradigm has extended the life of IPv4.
- What is the role of root servers in the domain name system?
3.Describe two different types of inspection used in packet inspection firewalls.
4.Describe how a buffer overflow attack works.
5.Describe the features of anomaly-based intrusion detection scheme.
6.What are the limitations of intrusion detection systems? Intrusion prevention systems?
7.Describe a routing attack on the Internet infrastructure. What is the goal of an attacker conducting a routing
attack?
8.Describe how an application proxy firewall operates in a manner different from lower-layer firewalls.
9.Compare and contrast signature-based (misuse) detection and anomaly-based detection.
10.Describe two common BGP attack mechanisms
Sample Solution