Answer Posted / shashank
Spam
Tojans
Viruses
DOS(Denial of Service)
Buffer overflow
SQL Injection
cross site scripting
phishing
n lot more the more you having vulnerabilities in your
network the more attacker gets chance to penetrate your
network.
| Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
What is a ddos attack?
What are the possible ways of data exchange
Explain for a small lan which class of addressing is used?
How does dlp work?
What is the difference between arp & rarp?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is an information security management system (isms)?
What is the difference between cybersecurity and information security?
What are all the technical steps involved when the data transmission from server via router?
How to you keep yourself updated on network security ?
Difference between the communication and transmission.
What is network access control?
How does network security work?
What is data loss prevention (dlp)?
What are the different types of vpns?