1. What is LEAP? How does LEAP work and what are the key features of
LEAP (main characteristics)?
2. . An IDS helps analyse and respond to attacks from both inside and outside the network. How is it used to perform this function? How do you install an IDS in a network to improve its’ effectiveness? Can an IDS respond to the threat detected by itself? What are the main characteristics of an IDS that make it useless to stop or interrupt a threat detected?
3. What can an IDS not protect against? if it can detect then it is performing it’s job, what threat or type of threat an IDS will not be able to detect? Give Adleast 3 reasons