1. What is the weakest link in network security?
- reconnaissance
- access
- DoS
- social engineering
Explanation: Man-in-the-Middle is an access attack in which the threat actor is positioned between legitimate entities in order to read or modify the data that passes between them.
2. What type of attack is tailgating?
- reconnaissance
- access
- DoS
- social engineering
Explanation: Tailgating is a social engineering attack where a threat actor quickly follows an authorized person into a secure location by taking advantage of the authorized person’s credentials.
3. What type of attack is port scanning?
- reconnaissance
- access
- DoS
- social engineering
Explanation: Port scanning is a reconnaissance attack in which a threat actor uses a tool like Nmap to scan for open TCP or UDP ports on active devices in a network.
4. What is the weakest link in network security?
- routers
- people
- TCP/IP
- social engineering
Explanation: In any organization, people can be weakest link in network security. People fall victim to social engineering attacks, open file attachments that contain malware, or use insecure passwords, for example.