COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Unpatched software
|
|
Default settings
|
|
Weak security configurations
|
|
Zero-day exploit
|
Detailed explanation-1: -A wireless access point configured to use Wired Equivalent Privacy (WEP) is an example of which kind of vulnerability? EXPLANATION Configuring a wireless access point with WEP would be considered a weak security configuration because WEP has been shown to be insecure.
Detailed explanation-2: -Which impact of vulnerabilities occurs when an attacker uses information gained from a data breach to commit fraud by doing things like opening new accounts with the victim’s information? EXPLANATION Identity theft is when an attacker uses data from a victim to commit fraud.
Detailed explanation-3: -Expert Answer. Option B is the correct answer-when a user deletes any new product designs accidentally without authorization then leads to an internal threat in that company.
Detailed explanation-4: -Which of the following do switches and wireless access points use to control access through a device? Both switches and wireless access points are Layer 2 devices, meaning they use the MAC address to make forwarding decisions.