Ct 325 Unit 1 Quiz 1 Essay

365 WordsMar 8, 20152 Pages
Match the attacks on the left with the vulnerabilities on the right that allows each attack to succeed. 1. An attacker is able to launch a denial of service (DoS) attack from a single computer that has attacked you before. 2. An intern can access several user accounts after learning their birthdays and pets names. 3. An attacker crashes your Microsoft Structured Query Language (SQL) Server database exploiting a vulnerability from 2008. 4. Your Web server computer becomes infected with the Slammer worm. 5. Users are not aware that your organization prohibits accessing Facebook at work. 6. Attackers find deleted unencrypted copies of several files you created and stored as encrypted. 7. Another user makes destructive changes to one of your spreadsheets. 8. An attacker can access the Web server. running on your domain server computer. and run the sample programs. 9. An attacker is able to launch a denial of service (DoS) attack from a single computer that has attacked you before. 10. An intern can access several user accounts after learning their birthdays and pets names. 11. An attacker crashes your Microsoft Structured Query Language (SQL) Server database exploiting a vulnerability from 2008. 12. Your Web server computer becomes infected with the Slammer worm. 13. Users are not aware that your organization prohibits accessing Facebook at work. 14. Attackers find deleted unencrypted copies of several files you created and stored as encrypted. 15. Another user makes destructive changes to one of your spreadsheets. 16. An attacker can access the Web server. running on your domain server computer. and run the sample programs. Attacks Vulnerabilities a. Lack of anti-malware software b. Unpatched software c. Weak security training d. Weak on-disk encryption e. No firewall or

More about Ct 325 Unit 1 Quiz 1 Essay

Open Document