List at least four common network threats.

What will be an ideal response?


Any four of the following or related threats is correct.
System crashes and other hardware failures
Administrative access control weaknesses
Malware (viruses, worms, and so on)
Social engineering
Denial of Service attacks
Physical intrusion
Attacks on wireless connections

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1Prishna has decided that data entry for the database for her small business would be expedited if she designed a form for her two employees who maintain her records. She studies the tools available to her on the Design tab, to maximize the work that these resources can accomplish for her. Sometimes, Prishna’s team has PDFs of invoices or estimates that they store along with a customer’s record. Which of the following Design tab tools would allow the form that Prishna designs to display to users files stored in an underlying field?

A. Attachment B. Combo Box C. Bound Object Frame D. Text Box

Computer Science & Information Technology

Which of the following Snort modes displays packet information to the console?

A) Sniffer B) Analyzer C) Packet logger D) Network intrusion-detection

Computer Science & Information Technology

Color ____ indicates that one color is dominating a picture.

A. cast B. tone C. saturation D. hue

Computer Science & Information Technology

A macro virus is a virus that is attached to a file such as a Word document or Excel workbook

Indicate whether the statement is true or false

Computer Science & Information Technology