Answer Posted / shashank
Spam
Tojans
Viruses
DOS(Denial of Service)
Buffer overflow
SQL Injection
cross site scripting
phishing
n lot more the more you having vulnerabilities in your
network the more attacker gets chance to penetrate your
network.
| Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
What is subnet
What is Imaging/ghosting?
How does ransomware work?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Where do you get updates on security?
What is IPCONFIG command? Why it is used?
What are the types of Transmission media
How to you keep yourself updated on network security ?
Describe a TCP connection sequence
What are the different type of networking / internetworking devices
Explain abouT Security Life Cycle.
who is a hacker?
How does network security work?
Explain the difference between broadcast domain and collision domain?
What is the sense of a fingerprint?