COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Stealing usernames and passwords
|
|
Modifying website content
|
|
Disrupting network communications
|
|
All of the above
|
Detailed explanation-1: -(Hackers may have different motivations, but their activities can include stealing usernames and passwords, modifying website content, disrupting network communications, and analyzing network traffic.)
Detailed explanation-2: -Trojans give attackers backdoor access to a device, perform keylogging, install viruses or worms, and steal data. Remote access Trojans (RATs) enable attackers to take control of an infected device. Once inside, attackers can use the infected device to infect other devices with the RAT and create a botnet.
Detailed explanation-3: -Trojan horse: A destructive program that pretends to be a useful application, but harms your computer or steals your information after it’s installed.
Detailed explanation-4: -A and D-Examples of availability threats include denial of service, power outage, hardware failure, destruction, and service outage.
Detailed explanation-5: -Data Classification. Strict Access Controls. Monitoring Privileged Account Access. Encrypting Sensitive Data. Security Awareness training. Network Segregation and Segmentation. Cloud Security. More items •04-Oct-2022