HACKING PROCESS & DOMAINS OF IT INFRASTRUCTURE PRACTICE QUESTIONS WITH COMPLETE SOLUTIONS 100% PASS
7 views 0 purchase
Course
IT Infrastructure
Institution
IT Infrastructure
HACKING PROCESS & DOMAINS OF IT INFRASTRUCTURE PRACTICE QUESTIONS WITH COMPLETE SOLUTIONS 100% PASS
List the 7 domains of IT infrastructure - Answers 1. User domain
2. Workstation domain
3. LAN domain
4. LAN to WAN domain
5. WAN domain
6. Remote domain
7. System/Application domain
What are ...
HACKING PROCESS & DOMAINS OF IT INFRASTRUCTURE PRACTICE QUESTIONS WITH COMPLETE
SOLUTIONS 100% PASS
List the 7 domains of IT infrastructure - Answers 1. User domain
2. Workstation domain
3. LAN domain
4. LAN to WAN domain
5. WAN domain
6. Remote domain
7. System/Application domain
What are the threats, vulnerabilities (weaknesses) and risks associated with the User domain? - Answers
User domain includes individual associated with the organization like users, employees, managers,
contractors, or consultants.
Threats
* Social engineering - users are attacked by persuasion or impersonation in order to gain access to
facilities or computing resources
* Phishing - users are tricked into giving away information such as login/passwords via fraudulent e-mail
* Trojan horses & Spyware - users are tricked into installing malware on their systems
Vulnerabilities
* Weak procedures
* Weak physical security
Risks
* Unauthorized access to facilities
* Compromised user accounts
, * Unauthorized access to data
* Bypass of security controls
What are the threats, vulnerabilities (weaknesses) and risks associated with the Workstation domain? -
Answers Workstations, stand-alone systems, home computers
* Port scanning can be used to find unsecured ports for attackers to exploit
* Malicious Web sites use attack techniques such as cross-site scripting
Vulnerabilities
* Non-patched operating systems/applications
* Weak or default passwords
* Insecure use of administrative accounts
* Insufficient or no malware protection
Risks
* Compromised systems can be used to attack others
* Data exposure, loss or change
* Loss of availability
What are the threats, vulnerabilities (weaknesses) and risks associated with the Local Area Network
(LAN) domain? - Answers LAN has hosts on private LANs
Threats
*Electronic threats include malware, malicious code, botnets, and software bugs
*Physical threats include hardware failure, natural disasters, and accidental or purposeful damage to
equipment
* Human threats include disgruntled employees, poorly trained employees, hackers
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TutorJosh. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.