Professional Documents
Culture Documents
FinalsA1 M5U1 GalanoAndrew
FinalsA1 M5U1 GalanoAndrew
2) An attacker has used a rogue access point to intercept traffic passing between
wireless clients and the wired network segment. What type of attack is this?
● An attacker will have to be in the middle of both clients and the server network
itself. By accessing the access point, he becomes the “Man-in-the-middle” (MitM)
to compromised both the users and the server they were connecting to.
6) Why should a security policy instruct users not to reveal their password to technical
support staff?
● Users are vulnerable to social engineering attacks, in which the support staff can
be suspicious and less trusted to withhold such sensitive information, thus it can
be exploited for nefarious reasons beyond just stealing user information.
7) How might someone masquerade as someone else when using email or Instant
Messaging?
● If someone left their device unattended and not logged out, the impersonator can
instantly access his/her account without the user’s presence and attentiveness to
secure his/her account from outsiders. That is why it is important to log out from
your account first before leaving.
9) What are the three main areas where redundancy should be provisioned?
● Data/Storage, Network Links, and Power.