Answer Posted / shashank
Spam
Tojans
Viruses
DOS(Denial of Service)
Buffer overflow
SQL Injection
cross site scripting
phishing
n lot more the more you having vulnerabilities in your
network the more attacker gets chance to penetrate your
network.
| Is This Answer Correct ? | 5 Yes | 0 No |
Post New Answer View All Answers
explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)
Diff bet ripv1 & ripv2?
Why is it important to have a nac solution?
explain what is meant by port blocking within lan?
Difference between the communication and transmission.
What is Cross Site Request Forgery and how to defend against it?
What is mesh network
What is cloud security?
What are the types of phishing attacks?
who is a hacker?
What are the main components of the CERT Taxonomy?
Why do we use virtual private network?
Explain what are digital signatures and smart cards?
Why should you care about the OSI Reference Model
Can you give me some ransomware variants?