14.3.7 Check Your Understanding – Identify the Types of Network Attacks Answers

1. What is the weakest link in network security?

  • reconnaissance
  • access
  • DoS
  • social engineering

Explanation: Man-in-the-Middle is an access attack in which the threat actor is positioned between legitimate entities in order to read or modify the data that passes between them.

2. What type of attack is tailgating?

  • reconnaissance
  • access
  • DoS
  • social engineering

Explanation: Tailgating is a social engineering attack where a threat actor quickly follows an authorized person into a secure location by taking advantage of the authorized person’s credentials.

3. What type of attack is port scanning?

  • reconnaissance
  • access
  • DoS
  • social engineering

Explanation: Port scanning is a reconnaissance attack in which a threat actor uses a tool like Nmap to scan for open TCP or UDP ports on active devices in a network.

4. What is the weakest link in network security?

  • routers
  • people
  • TCP/IP
  • social engineering

Explanation: In any organization, people can be weakest link in network security. People fall victim to social engineering attacks, open file attachments that contain malware, or use insecure passwords, for example.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments