NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Data loss or manipulation
|
|
Disruption of service
|
|
Identity theft
|
|
Information theft
|
Detailed explanation-1: -What kind of threat is described when a threat actor prevents legal users from accessing data services? Disruption of service attacks occur when legitimate users are prevented from accessing data and services.
Detailed explanation-2: -A denial-of-service (DoS) attack is a security threat that occurs when an attacker makes it impossible for legitimate users to access computer systems, network, services or other information technology (IT) resources.
Detailed explanation-3: -Phishing occurs when a threat actor impersonates a trusted entity through email to try and fraudulently obtain personal information, financial information or access to systems.
Detailed explanation-4: -Security policies can help ensure that all devices on a network are protected against viruses and malware and that users are using strong passwords. These policies can also restrict access to some network regions and limit user privileges.