What specific things can an attacker do if he or she takes over a router?

A. The attacker can'r do anything to harm the network.
B. The attacker can re-route traffic or reconfigure the router to cause a local DoS
C. The attacker can effectively map the entire internal network.
D. The attacker can effectively map the entire internal network and re-route traffic or reconfigure the router to cause a local DoS.


D. The attacker can effectively map the entire internal network and re-route traffic or reconfigure the router to cause a local DoS.

Computer Science & Information Technology

You might also like to view...

Electronic paper (e-paper) requires less energy but is limited to one color

Indicate whether the statement is true or false

Computer Science & Information Technology

Server Core can be managed remotely by using Windows PowerShell or GUI management tools such as Windows Remote Management and Windows Management Instrumentation, but Nano Server can only be managed remotely by PowerShell.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A company hires a third-party firm to conduct an assessment of vulnerabilities exposed to the Internet. The firm informs the company that an exploit exists for anFTP server that had a version installed from eight years ago. The company has decided to keep the system online anyway, as no upgrade exists form the vendor.Which of the following BEST describes the reason why the vulnerability exists?

A. Default configuration B. End-of-life system C. Weak cipher suite D. Zero-day threats

Computer Science & Information Technology

One technique used to model a corporation's network environment is to create ____.?

A. ?link shadows B. ?node approaches C. ?dots mode D. ?connectivity maps

Computer Science & Information Technology