List at least four common network threats.
What will be an ideal response?
Any four of the following or related threats is correct.
System crashes and other hardware failures
Administrative access control weaknesses
Malware (viruses, worms, and so on)
Social engineering
Denial of Service attacks
Physical intrusion
Attacks on wireless connections
You might also like to view...
Case-Based Critical Thinking QuestionsCase 1Prishna has decided that data entry for the database for her small business would be expedited if she designed a form for her two employees who maintain her records. She studies the tools available to her on the Design tab, to maximize the work that these resources can accomplish for her. Sometimes, Prishna’s team has PDFs of invoices or estimates that they store along with a customer’s record. Which of the following Design tab tools would allow the form that Prishna designs to display to users files stored in an underlying field?
A. Attachment B. Combo Box C. Bound Object Frame D. Text Box
Which of the following Snort modes displays packet information to the console?
A) Sniffer B) Analyzer C) Packet logger D) Network intrusion-detection
Color ____ indicates that one color is dominating a picture.
A. cast B. tone C. saturation D. hue
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook
Indicate whether the statement is true or false