COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Vulnerability testing
|
|
Intrusion prevention system
|
|
Host intrusion detection system (HIDS)
|
|
Penetration testing
|
Detailed explanation-1: -Open ports, weak user credentials, unsafe user privileges and unpatched applications are types of vulnerabilities that a hacker could use to compromise your systems.
Detailed explanation-2: -The third penetration testing phase is vulnerability assessment, in which the tester uses all the data gathered in the reconnaissance and scanning phases to identify potential vulnerabilities and determine whether they can be exploited.
Detailed explanation-3: -Penetration testing is the exploitation of vulnerabilities present in an organization’s network. It helps determine which vulnerabilities are exploitable and the degree of information exposure or network control that the organization could expect an attacker to achieve after successfully exploiting vulnerability.
Detailed explanation-4: -Password Attacks and Default Password. Operating System Attacks. Application Level Attacks. Misconfiguration Issues. Cross-Site Scripting (XSS) Misconfiguration Issues.