answersLogoWhite

0


Best Answer

security audit

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: A blank is a thorough examination of each aspect of the network to determine how it might be compromised?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which type of network attack exploits vulnerabilities in the compromised system with the intent of propagating itself across a network?

worm


Is Network security is more often compromised from the inside than external sources?

True


What if your computer is compromised You should disconnect from the network, perform a system backup, reboot the system, and contact the ACERT?

False. Trackable information will be lost if you reboot.


How is botnet created?

A botnet is a collection of compromised computers connected to the Internet (each compromised computer is known as a 'bot'). When a computer is compromised by an attacker, there is often code within the malware that commands it to become part of a botnet. The "botmaster" or "bot herder" controls these compromised computers via standards based network protocols such as IRC and http.


Which protocol allows secure in-band management so that a network administrator can monitor and configure network devices without fear of any passwords being compromised?

SSH


If What if your computer is compromised should You disconnect from the network perform a system backup reboot the system and contact the ACERT?

No / False


What are three important reasons to establish a network baseline?

to determine which areas in the network are underutilized or overutilizedto determine the performance of the network during the normal hours of operationto determine what thresholds should be set for the devices that need to be monitored


At which OSI layer does a computer determine if the packet is intended for it on a 10BaseT Network?

The Network Layer


What is administration network security and why is it so important?

I think you mean network administration security. It's important because a compromised network allows all sorts of problems: viruses, vulnerability of sensitive data, and your computers become "zombie PCs" are all hazards of an insecure network.


Which of the following can best be used to determine the topology of a network and discover unknown devices?

Network mapper


What if your computer is compromised. You should disconnect from the network perform a system backup reboot the system and contact the ACERT true or false?

It's false.


What was the name of the network that was formed to pass along news in the colony of Massachusetts?

The name of the network that was formed to pass along news in the colony of Massachusetts was Committees of Correspondence. This was a group that was mainly compromised of artisans and farmers in the colonies.