Answer: Snort
Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.
The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.
Answer:
<em>Source port numbers and Destination </em>
Explanation:
Sockets are also <em>known as the source and destination IP addresses are combined with the source and destination port numbers. </em>
The socket is used to define the client's request for server and network.
Thousands of hosts are communicating with millions of separate servers every day.
Answer:
a. file-naming conventions
Explanation:
File names need to follow certain criteria and constraints. Examples include:
- File names must not start with special symbols.
- File names can consist of letters,digits and special characters such as _.
- File name can contain an extension after a dot sign.
- File names must not be duplicates of an existing file.
Such constraints form part of file-naming conventions.
- file-path represents the complete path to the file in the directory structure.
- disk partition segments a hard disk into multiple volumes.
- file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.