Free Essay

Ct325

In:

Submitted By pmpress
Words 365
Pages 2
Match the attacks on the left with the vulnerabilities on the right that allows each attack to succeed. 1. An attacker is able to launch a denial of service (DoS) attack from a single computer that has attacked you before. 2. An intern can access several user accounts after learning their birthdays and pets names. 3. An attacker crashes your Microsoft Structured Query Language (SQL) Server database exploiting a vulnerability from 2008. 4. Your Web server computer becomes infected with the Slammer worm. 5. Users are not aware that your organization prohibits accessing Facebook at work. 6. Attackers find deleted unencrypted copies of several files you created and stored as encrypted. 7. Another user makes destructive changes to one of your spreadsheets. 8. An attacker can access the Web server. running on your domain server computer. and run the sample programs. 9. An attacker is able to launch a denial of service (DoS) attack from a single computer that has attacked you before. 10. An intern can access several user accounts after learning their birthdays and pets names. 11. An attacker crashes your Microsoft Structured Query Language (SQL) Server database exploiting a vulnerability from 2008. 12. Your Web server computer becomes infected with the Slammer worm. 13. Users are not aware that your organization prohibits accessing Facebook at work. 14. Attackers find deleted unencrypted copies of several files you created and stored as encrypted. 15. Another user makes destructive changes to one of your spreadsheets. 16. An attacker can access the Web server. running on your domain server computer. and run the sample programs.
Attacks Vulnerabilities a. Lack of anti-malware software b. Unpatched software c. Weak security training d. Weak on-disk encryption e. No firewall or firewall not properly configured f. Weak permissions g. Unneeded software running h. Weak passwords i. Lack of anti-malware software j. Unpatched software k. Weak security training l. Weak on-disk encryption m. No firewall or firewall not properly configured n. Weak permissions o. Unneeded software running p. Weak passwords

Fill in the answers below:
Fill in the answers below:

1. | G | 2. | H | 3. | B | 4. | A | 5. | C | 6. | D | 7. | F | 8. | E |

Similar Documents