COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How configuration weakness is exploited?
A
Firewall holes
B
Default settings
C
Unwritten policy
D
Lack of continuity
Explanation: 

Detailed explanation-1: -The router is the main gateway to your network, and also to all devices connected to it. Therefore, someone who has obtained your router’s key could change the settings and hijack the network, leaving you without access.

Detailed explanation-2: -A vulnerability in security refers to a weakness or opportunity in an information system that cybercriminals can exploit and gain unauthorized access to a computer system. Vulnerabilities weaken systems and open the door to malicious attacks.

Detailed explanation-3: -Weak configurations can post just as much of a threat as issues such as unpatched software. Weak configurations can be present in both software and hardware, with potentially serious consequences. Default configurations can not be considered secure and should be reviewed to ensure they comply with best practices.

There is 1 question to complete.