COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability?
A
Unpatched software
B
Default settings
C
Weak security configurations
D
Zero-day exploit
Explanation: 

Detailed explanation-1: -A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability? EXPLANATION Configuring a wireless access point with WEP would be considered a weak security configuration because WEP has been shown to be insecure.

Detailed explanation-2: -Which impact of vulnerabilities occurs when an attacker uses information gained from a data breach to commit fraud by doing things like opening new accounts with the victim’s information? EXPLANATION Identity theft is when an attacker uses data from a victim to commit fraud.

Detailed explanation-3: -Expert Answer. Option B is the correct answer-when a user deletes any new product designs accidentally without authorization then leads to an internal threat in that company.

Detailed explanation-4: -Which of the following do switches and wireless access points use to control access through a device? Both switches and wireless access points are Layer 2 devices, meaning they use the MAC address to make forwarding decisions.

There is 1 question to complete.