100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

HACKING PROCESS & DOMAINS OF IT INFRASTRUCTURE PRACTICE QUESTIONS WITH COMPLETE SOLUTIONS 100% PASS

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
11-10-2024
Written in
2024/2025

HACKING PROCESS & DOMAINS OF IT INFRASTRUCTURE PRACTICE QUESTIONS WITH COMPLETE SOLUTIONS 100% PASS List the 7 domains of IT infrastructure - Answers 1. User domain 2. Workstation domain 3. LAN domain 4. LAN to WAN domain 5. WAN domain 6. Remote domain 7. System/Application domain What are the threats, vulnerabilities (weaknesses) and risks associated with the User domain? - Answers User domain includes individual associated with the organization like users, employees, managers, contractors, or consultants. Threats * Social engineering - users are attacked by persuasion or impersonation in order to gain access to facilities or computing resources * Phishing - users are tricked into giving away information such as login/passwords via fraudulent e-mail * Trojan horses & Spyware - users are tricked into installing malware on their systems Vulnerabilities * Weak procedures * Weak physical security Risks * Unauthorized access to facilities * Compromised user accounts * Unauthorized access to data * Bypass of security controls What are the threats, vulnerabilities (weaknesses) and risks associated with the Workstation domain? - Answers Workstations, stand-alone systems, home computers Threats * Malware (e.g., viruses, worms, Trojans, spyware, etc.) * Port scanning can be used to find unsecured ports for attackers to exploit * Malicious Web sites use attack techniques such as cross-site scripting Vulnerabilities * Non-patched operating systems/applications * Weak or default passwords * Insecure use of administrative accounts * Insufficient or no malware protection Risks * Compromised systems can be used to attack others * Data exposure, loss or change * Loss of availability What are the threats, vulnerabilities (weaknesses) and risks associated with the Local Area Network (LAN) domain? - Answers LAN has hosts on private LANs Threats *Electronic threats include malware, malicious code, botnets, and software bugs *Physical threats include hardware failure, natural disasters, and accidental or purposeful damage to equipment * Human threats include disgruntled employees, poorly trained employees, hackers Vulnerabilities * weak security procedures * weak security controls * weak perimeter controls. Risks * Result in compromise of the enterprise * Data exposure, loss, or change - basic risk * Disruption of business What are the threats, vulnerabilities (weaknesses) and risks associated with the LAN/WAN connection point? - Answers Routers, firewalls, other devices at the LAN/WAN connection point Threats * Port scanning to reveal details of configuration that may allow an attacker to better profile additional services. * DoS/DDoS: Gateway is a constrained point with limited bandwidth and can be easily saturated. * Directed attack: WAN connection is exposed to the public Internet and directly accessible. Vulnerabilities * Weak perimeter security * Weak or default firewall passwords * Incorrect configuration or misconfiguration due to complexities in rules sets Risks * Network instability.

Show more Read less
Institution
IT Infrastructure
Course
IT Infrastructure









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IT Infrastructure
Course
IT Infrastructure

Document information

Uploaded on
October 11, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

HACKING PROCESS & DOMAINS OF IT INFRASTRUCTURE PRACTICE QUESTIONS WITH COMPLETE
SOLUTIONS 100% PASS

List the 7 domains of IT infrastructure - Answers 1. User domain

2. Workstation domain

3. LAN domain

4. LAN to WAN domain

5. WAN domain

6. Remote domain

7. System/Application domain

What are the threats, vulnerabilities (weaknesses) and risks associated with the User domain? - Answers
User domain includes individual associated with the organization like users, employees, managers,
contractors, or consultants.

Threats

* Social engineering - users are attacked by persuasion or impersonation in order to gain access to
facilities or computing resources



* Phishing - users are tricked into giving away information such as login/passwords via fraudulent e-mail



* Trojan horses & Spyware - users are tricked into installing malware on their systems



Vulnerabilities

* Weak procedures

* Weak physical security



Risks

* Unauthorized access to facilities

* Compromised user accounts

, * Unauthorized access to data

* Bypass of security controls

What are the threats, vulnerabilities (weaknesses) and risks associated with the Workstation domain? -
Answers Workstations, stand-alone systems, home computers

Threats

* Malware (e.g., viruses, worms, Trojans, spyware, etc.)

* Port scanning can be used to find unsecured ports for attackers to exploit

* Malicious Web sites use attack techniques such as cross-site scripting



Vulnerabilities

* Non-patched operating systems/applications

* Weak or default passwords

* Insecure use of administrative accounts

* Insufficient or no malware protection



Risks

* Compromised systems can be used to attack others

* Data exposure, loss or change

* Loss of availability

What are the threats, vulnerabilities (weaknesses) and risks associated with the Local Area Network
(LAN) domain? - Answers LAN has hosts on private LANs

Threats

*Electronic threats include malware, malicious code, botnets, and software bugs

*Physical threats include hardware failure, natural disasters, and accidental or purposeful damage to
equipment

* Human threats include disgruntled employees, poorly trained employees, hackers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
342
Member since
1 year
Number of followers
16
Documents
28610
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions