Identify five common threats as noted by CompTIA.
What will be an ideal response?
The list could go on for pages. However, common threats listed by CompTIA include:
• Spoofing
• Packet/protocol abuse
• Zero-day attack
• ARP cache poisoning
• Denial of service (with a lot of variations on a theme)
• Man-in-the-middle
• Session hijacking
• Brute force
• Compromised system
• Insider threat/malicious employee
• VLAN hopping
• Administrative access control
• Malware
• Social engineering
You might also like to view...
You can use ________ programs to create family trees
Fill in the blank(s) with correct word
How do you launch an app from the Start screen?
A) double-click it B) triple-click it C) click it D) right-click it
Which of the following is NOT identified in the textbook as an area that may be required by law to do a background check?
A) Banking B) Health care C) Education D) Programming
What is the entropy of this collection of training examples with respect to the positive class?
What is the entropy of this collection of training examples with respect to the positive class?