COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK TOPOLOGIES AND PROTOCOLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these is not an advantage of a Network? (1-4)
A
Shared les and resources
B
Less vulnerable to hackers
C
Data can be shared across a range of users
D
User accounts can be created
Explanation: 

Detailed explanation-1: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

Detailed explanation-2: -A black hat hacker is someone who maliciously searches for and exploits vulnerabilities in computer systems or networks, often using malware and other hacking techniques to do harm.

Detailed explanation-3: -Explanation: The advantages are minimization of computer freezing and crashes, user privacy, and protection against viruses, worms, etc. Disadvantages include the system becoming slow, configuring firewalls correctly can be difficult, need to update the new software in order to keep security up to date.

Detailed explanation-4: -Massive security breach. Unauthorized system access on private information. Privacy violation. Hampering system operation. Denial of service attacks. Malicious attack on the system.

There is 1 question to complete.