answersLogoWhite

0


Best Answer

forensics and technical

User Avatar

Wiki User

6y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are two types of exploitation used to attack the network?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What are the types of exploitation used to attack the network?

forensics and technical


What are the two types exploitation used to attack the network?

forensics and technical


What are the two types of exploitation a used to attack the network?

not tactical and forensics


What are the two types of exploitation used to attack a terrorist network?

not tactical and forensics


What are two types of exploitation used to attack a computer network?

accessing someone email or personal details Cyber stalking


What are the two types of exploitation used to attack?

forensics and technical


What is used to repel most attack on the home network?

Firewalls


Compare and contrast the three types of addresses used in a network?

compare and contrast the three types of addresses used in a network


What are 3 types of authentication used to access a wireless network?

There are many types of authentications can be used in access wireless network. mainly 3 types are used: User only Authentication, Device Only Authentication, User+Device Authentication. They are self explanatory.


Which security device is used to monitor network traffic for illegal activities based on known attack-signatures?

NIDS


Simple network management protocol snmp is used for network management however it is deemed relatively insecure which type of attack are all versions of snmp subject to?

Brute force


Which defensive measures can you take to mitigate the possibility that your network could be used in this type of attack?

1. Filter packets leaving your network with source addresses that do not originate inside your network. 2. Filter packets entering your network with a broadcast address for a destination