COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following actions compromise cyber security?
A
Vulnerability
B
Threat
C
Attack
D
Exploit
Explanation: 

Detailed explanation-1: -Explanation: Extortion, identity theft, email hacking, digital surveillance, stealing hardware, mobile hacking, and physical security breaches are all examples of cyber assaults or activities.

Detailed explanation-2: -Which of the following act violates cyber security? a) Exploit b) Attack c) Threat d) Vulnerability View Answer Answer: b Explanation: A threat is a possible danger that might lead to a security breach and cause harm to the system or network.

Detailed explanation-3: -The technique of protecting laptops, websites, mobile platforms, communications devices, networking, and data from hostile intrusions is known as cyber security.

Detailed explanation-4: -Threat − Is an action or event that might compromise the security. Vulnerability − It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding security system.

Detailed explanation-5: -Malware attack. Social engineering attacks. Software supply chain attacks. Advanced persistent threats (APT) Distributed denial of service (DDoS) Man-in-the-middle attack (MitM) Password attacks. 01-Feb-2023

There is 1 question to complete.