You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules and routers with no configuration errors.
Which of the following techniques practiced by an attacker exploits human behavior to make your network vulnerable to attacks?
Social Engineering
Buffer overflow
Denial of Service
SQL injection

Respuesta :

Answer:

Social Engineering

Explanation:

Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.

Otras preguntas