COMPUTER NETWORKING

WIRELESS NETWORKS AND MOBILE IP

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Performs a ‘barrier’ between a potential attacker and the computer system
A
Packet sniffing
B
Firewalls
C
Brute force attacks
D
SQL injection
Explanation: 

Detailed explanation-1: -Vulnerability management is the process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them. This, implemented alongside with other security tactics, is vital for organizations to prioritize possible threats and minimizing their “attack surface."

Detailed explanation-2: -Certified Ethical Hacker (CEH).

Detailed explanation-3: -The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act: It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking .

There is 1 question to complete.