In the video that describes the anatomy of an attack, a threat actor was able to gain access through a network device, download data, and destroy it. Which flaw allowed the threat actor to do this?

IT Questions BankCategory: CCNA SecurityIn the video that describes the anatomy of an attack, a threat actor was able to gain access through a network device, download data, and destroy it. Which flaw allowed the threat actor to do this?

In the video that describes the anatomy of an attack, a threat actor was able to gain access through a network device, download data, and destroy it. Which flaw allowed the threat actor to do this?

  • a flat network with no subnets or VLANs
  • improper physical security to gain access to the building
  • lack of a strong password policy
  • open ports on the firewall

Explanation: The company had a flat network with no subnets. The threat actor was able to access and destroy all kinds of corporate data due to a thermostat that was on the network, but was not scanned as part of the security procedures.

Exam with this question: Module 1: Quiz – Securing Networks Network Security
Exam with this question: 2.3.2 Securing Networks Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments