Ask Question
28 March, 10:48

You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules and routers with no configuration errors.

Which of the following techniques practiced by an attacker exploits human behavior to make your network vulnerable to attacks?

Social Engineering

Buffer overflow

Denial of Service

SQL injection

+5
Answers (1)
  1. 28 March, 14:28
    0
    Social Engineering

    Explanation:

    Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules and routers ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers