COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Penetration testing
|
|
Vulnerability testing
|
|
Sandboxing
|
|
Network intrusion detection system (NIDS)
|
Detailed explanation-1: -Perform a light network vulnerability scan It starts by running Nmap to detect open ports and services. Then, based on the results returned by Nmap, our network scanner interrogates a database with known vulnerabilities to check if the specific versions of the services are affected by any issues.
Detailed explanation-2: -Network equipment weakness Their weaknesses include password protection, lack of authentication, routing protocols, and firewall holes.
Detailed explanation-3: -Vulnerability scanners can be configured to scan all network ports, detecting and identifying password breaches as well as suspicious applications and services. The scanning service reports security fixes or missing service packs, identifies malware as well as any coding flaws, and monitors remote access.