COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK TOPOLOGIES AND PROTOCOLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Shared les and resources
|
|
Less vulnerable to hackers
|
|
Data can be shared across a range of users
|
|
User accounts can be created
|
Detailed explanation-1: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.
Detailed explanation-2: -A black hat hacker is someone who maliciously searches for and exploits vulnerabilities in computer systems or networks, often using malware and other hacking techniques to do harm.
Detailed explanation-3: -Explanation: The advantages are minimization of computer freezing and crashes, user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring firewalls correctly can be difficult, need to update the new software in order to keep security up to date.
Detailed explanation-4: -Massive security breach. Unauthorized system access on private information. Privacy violation. Hampering system operation. Denial of service attacks. Malicious attack on the system.