COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
when something gets infected by Malware
|
|
out of date software.
|
|
when user accounts have incorrect permissions set up by the network manager.
|
|
None of the above
|
Detailed explanation-1: -Misconfigured access rights Access rights set up what can and cannot be seen when someone logs into a system. If these are not set up correctly in an email server, a person may be able to see someone else’s emails. If a person accesses an account that they do not have permission to see, they might be breaking the law.
Detailed explanation-2: -Security misconfigurations are security controls that are inaccurately configured or left insecure, putting your systems and data at risk. Basically, any poorly documented configuration changes, default settings, or a technical issue across any component in your endpoints could lead to a misconfiguration.
Detailed explanation-3: -Impact of Security Misconfigurations Attacks For example, a misconfigured database server can cause data to be accessible through a basic web search. If this data includes administrator credentials, an attacker may be able to access further data beyond the database, or launch another attack on the company’s servers.