answersLogoWhite

0


Best Answer

accessing someone email or personal details

Cyber stalking

User Avatar

Wiki User

15y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

6y ago

A denial of service attack

A breach of security attack

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are two types of exploitation used to attack a computer network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the types of exploitation used to attack the network?

forensics and technical


What are two types of exploitation used to attack the network?

forensics and technical


What are the two types exploitation used to attack the network?

forensics and technical


What are the two types of exploitation a used to attack the network?

not tactical and forensics


What are the two types of exploitation used to attack a terrorist network?

not tactical and forensics


What are the two types of exploitation used to attack?

forensics and technical


What types of network accessories are compatible with a computer?

There are many types of network accessories that are compatible with a computer. For example: network cards, external hubs, USB link cables and network testers.


What are two types of computer networks?

Two types of computer networks are LAN (Local Area Network), which connects devices within a small geographic area like an office or building, and WAN (Wide Area Network), which connects devices over a larger geographic area, such as across cities or countries.


Which types of network connections use a network card in the computer for the physical connection?

An Ethernet (RJ45) connection can be found on a network card.


How many types of addresses does a network node have?

In computer networking, a node refers to a connection point. It has two types of addresses, a network address and a physical address.


Which type of network attack occurs when an unauthorized person tries to persuade a user to share a network user ID and?

What you are describing is not necessarily a network attack as it can be applied to all types of situations, not just network-based. It is known as "social engineering" and is a very low-tech approach to compromise a system or network.


What is computer networking explain the types of computer?

Computer networking can be defined as a process of establishing communication between a no. of autonomous computers in order to allow exchange of resources through the network. There are two main types of networking: 1) Peer to peer network : In this network all network resources are evenly shared , between all the users. All users in the network have equal administrative privileges. 2) Server client network: This is a network where there is only 1 central point in a network that supplies the network resources, this point has administrator privileges in the network and controls the whole network.