COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Vulnerability
|
|
Threat
|
|
Attack
|
|
Exploit
|
Detailed explanation-1: -Explanation: Extortion, identity theft, email hacking, digital surveillance, stealing hardware, mobile hacking, and physical security breaches are all examples of cyber assaults or activities.
Detailed explanation-2: -Which of the following act violates cyber security? a) Exploit b) Attack c) Threat d) Vulnerability View Answer Answer: b Explanation: A threat is a possible danger that might lead to a security breach and cause harm to the system or network.
Detailed explanation-3: -The technique of protecting laptops, websites, mobile platforms, communications devices, networking, and data from hostile intrusions is known as cyber security.
Detailed explanation-4: -Threat − Is an action or event that might compromise the security. Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.
Detailed explanation-5: -Malware attack. Social engineering attacks. Software supply chain attacks. Advanced persistent threats (APT) Distributed denial of service (DDoS) Man-in-the-middle attack (MitM) Password attacks. 01-Feb-2023