Answer the following questions
A. Is Snort an HIDS or an NIDS?
B. How many sensors does Snort use?
C. What does a preprocessor do?
D. Is Snort anomaly-based or signature-based?
E. What kind of file are Snort rules stored in?
F. What kind of file is Snort output (logging info) stored in?
G. Can you use Snort with network switches? With hubs?
H. What operating system(s) does Snort run on?
Can you provide the answer with reference to computer networking?