Answer Posted / shashank
Spam
Tojans
Viruses
DOS(Denial of Service)
Buffer overflow
SQL Injection
cross site scripting
phishing
n lot more the more you having vulnerabilities in your
network the more attacker gets chance to penetrate your
network.
| Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
What is remote access vpn?
What is proxy firewall?
What is trojan virus?
Explain how do we use rsa for both authentication and secrecy?
What is an arp?
What is IPCONFIG command? Why it is used?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
Name the port used by PING.
What are the types of Transmission media
What protocol is used by DNS name servers
How do we do authentication with message digest(md5)?
Explain what are digital signatures and smart cards?
How to implement PIX firewall security?
What is a DNS resource record
How does a virtual private network (vpn) work?