Answer Posted / shashank
Spam
Tojans
Viruses
DOS(Denial of Service)
Buffer overflow
SQL Injection
cross site scripting
phishing
n lot more the more you having vulnerabilities in your
network the more attacker gets chance to penetrate your
network.
Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
Explain the difference between discretionary access control and mandatory access control?
explain what is meant by port blocking within lan?
What are the different types of vpns?
What is cloud security?
How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
Explain what is the role of single sign on in authentication technologies?
What is frame relay, in which layer it comes
What is the difference between ripv1 & ripv2?
Explain what are digital signatures and smart cards?
What is the idea behind the Bell-La Padula model?
Which are the different factors that affect the security of a network?
What is the difference between cybersecurity and information security?
How does a virtual private network (vpn) work?
What is secure remote access?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?