Vulnerabilities in a Network

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

What is the risk of lack of encryption in a network?

Data can be intercepted and read by unauthorized users.

2
New cards

Why is having no enterprise antivirus a vulnerability?

It leaves the network exposed to malware and viruses.

3
New cards

What happens if there is no firewall on the network?

The network is open to external attacks without any traffic filtering.

4
New cards

What is the consequence of having no physical security for admin or IT offices?

Unauthorized personnel can access sensitive systems.

5
New cards

Why are no backups a critical vulnerability?

Loss of data due to hardware failure or cyberattacks becomes irreversible.

6
New cards

What is the risk of unsecured RJ45 (Ethernet) ports?

Unauthorized devices can connect directly to the network.

7
New cards

Why is incorrect firewall configuration risky?

It could allow unauthorized traffic to bypass network security.

8
New cards

What is the problem with using weaker WiFi protocols like WEP?

They can be easily hacked, compromising network security.

9
New cards

How can Bluetooth access be a security risk?

Weaker security or no passwords allow unauthorized connections.

10
New cards

Why is a weak password policy dangerous?

Hackers can easily guess passwords, leading to unauthorized access.

11
New cards

Why is outdated software a vulnerability?

It may contain known vulnerabilities that hackers can exploit.

12
New cards

How can USB flash drives pose a risk to the network?

They may contain malware such as keyloggers.

13
New cards

Why is using port 80 (HTTP) a vulnerability?

HTTP traffic is unencrypted, making it vulnerable to interception.

14
New cards

What is SQL injection?

A technique where attackers inject malicious SQL queries to manipulate databases.

15
New cards

How does a man-in-the-middle attack work?

Hackers intercept communication between two parties to steal or manipulate data.

16
New cards

Why is lack of multi-factor authentication a risk?

It makes it easier for unauthorized users to gain access.

17
New cards

Why are unsecured WiFi access points a problem?

They allow unauthorized users to connect to the network.

18
New cards

How do poorly protected personal or unauthorized devices pose a risk?

They may introduce malware or vulnerabilities to the network.

19
New cards

Why are broken authentication methods risky?

They make it easier for attackers to bypass login processes.