answersLogoWhite

0


Best Answer

worm

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which type of network attack exploits vulnerabilities in the compromised system with the intent of propagating itself across a network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is a major characteristic of a Worm?

exploits vulnerabilities with theintent of propagating itself across a network


Network Tasking Orders NTOs are?

Used to combat critical network vulnerabilities


What is the difference between operating system security and network security?

operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.


What are the vulnerabilities in the network?

Every network is different; the only way to find out the vulnerabilities in a given network is to initiate an audit of the network. One piece of that is risk assessment, and from that you develop a vulnerability matrix.


A network administrator determines that falsified routing information is propagating through the network What action can be used to address this threat?

Configure routing protocol authentication.


Is Network security is more often compromised from the inside than external sources?

True


What is the best defence for protecting a network from phishing exploits?

Look for digital cert.


A blank is a thorough examination of each aspect of the network to determine how it might be compromised?

security audit


What are current network threats?

While dealing with computers in a network, threats will always emerge. The current network threats include advanced DDos attacks, botnet attacks, insecure applications, vulnerabilities in embedded systems and sophisticated viruses.


What if your computer is compromised You should disconnect from the network, perform a system backup, reboot the system, and contact the ACERT?

False. Trackable information will be lost if you reboot.


How is botnet created?

A botnet is a collection of compromised computers connected to the Internet (each compromised computer is known as a 'bot'). When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards based network protocols such as IRC and http.


Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?

SSH