In the video that describes the anatomy of an attack, a threat actor was able to gain access through a network device, download data, and destroy it. Which flaw allowed the threat actor to do this?
- a flat network with no subnets or VLANs
- improper physical security to gain access to the building
- lack of a strong password policy
- open ports on the firewall
Explanation: The company had a flat network with no subnets. The threat actor was able to access and destroy all kinds of corporate data due to a thermostat that was on the network, but was not scanned as part of the security procedures.
Exam with this question: Module 1: Quiz – Securing Networks Network Security
Exam with this question: 2.3.2 Securing Networks Quiz
Please login or Register to submit your answer