Ask Question
25 October, 01:50

You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules and routers with no configuration errors.

Which of the following techniques practiced by an attacker exploits human behavior to make your network vulnerable to attacks?

Social Engineering

Buffer overflow

Denial of Service

SQL injection

+1
Answers (1)
  1. 25 October, 02:10
    0
    Social Engineering

    Explanation:

    Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules and routers ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers