Identify five common threats as noted by CompTIA.

What will be an ideal response?


The list could go on for pages. However, common threats listed by CompTIA include:
•       Spoofing
•       Packet/protocol abuse
•       Zero-day attack
•       ARP cache poisoning
•       Denial of service (with a lot of variations on a theme)
•       Man-in-the-middle
•       Session hijacking
•       Brute force
•       Compromised system
•       Insider threat/malicious employee
•       VLAN hopping
•       Administrative access control
•       Malware
•       Social engineering
 

Computer Science & Information Technology

You might also like to view...

You can use ________ programs to create family trees

Fill in the blank(s) with correct word

Computer Science & Information Technology

How do you launch an app from the Start screen?

A) double-click it B) triple-click it C) click it D) right-click it

Computer Science & Information Technology

Which of the following is NOT identified in the textbook as an area that may be required by law to do a background check?

A) Banking B) Health care C) Education D) Programming

Computer Science & Information Technology

What is the entropy of this collection of training examples with respect to the positive class?

What is the entropy of this collection of training examples with respect to the positive class?

Computer Science & Information Technology