1/18
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is the risk of lack of encryption in a network?
Data can be intercepted and read by unauthorized users.
Why is having no enterprise antivirus a vulnerability?
It leaves the network exposed to malware and viruses.
What happens if there is no firewall on the network?
The network is open to external attacks without any traffic filtering.
What is the consequence of having no physical security for admin or IT offices?
Unauthorized personnel can access sensitive systems.
Why are no backups a critical vulnerability?
Loss of data due to hardware failure or cyberattacks becomes irreversible.
What is the risk of unsecured RJ45 (Ethernet) ports?
Unauthorized devices can connect directly to the network.
Why is incorrect firewall configuration risky?
It could allow unauthorized traffic to bypass network security.
What is the problem with using weaker WiFi protocols like WEP?
They can be easily hacked, compromising network security.
How can Bluetooth access be a security risk?
Weaker security or no passwords allow unauthorized connections.
Why is a weak password policy dangerous?
Hackers can easily guess passwords, leading to unauthorized access.
Why is outdated software a vulnerability?
It may contain known vulnerabilities that hackers can exploit.
How can USB flash drives pose a risk to the network?
They may contain malware such as keyloggers.
Why is using port 80 (HTTP) a vulnerability?
HTTP traffic is unencrypted, making it vulnerable to interception.
What is SQL injection?
A technique where attackers inject malicious SQL queries to manipulate databases.
How does a man-in-the-middle attack work?
Hackers intercept communication between two parties to steal or manipulate data.
Why is lack of multi-factor authentication a risk?
It makes it easier for unauthorized users to gain access.
Why are unsecured WiFi access points a problem?
They allow unauthorized users to connect to the network.
How do poorly protected personal or unauthorized devices pose a risk?
They may introduce malware or vulnerabilities to the network.
Why are broken authentication methods risky?
They make it easier for attackers to bypass login processes.