Ask Question

Leah's computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missing. Later, she found that an attacker had impersonated her and accessed her computer remotely. On which hardware vulnerability did the attack occur?

The attacker attacked a vulnerability in the BLANK

connected to the client.

+3
Answers (1)
  1. 2 January, 10:07
    0
    The Firewall (Router) is the vulnerable hardware.

    Explanation:

    The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Leah's computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missing. Later, ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers