Professional Documents
Culture Documents
2. An attacker has used a rogue access point to intercept traffic passing between wireless
clients and the wired network segment. What type of attack is this?
- This is an impersonation attack.
6. Why should a security policy instruct users not to reveal their password to technical support
staff?
- A security policy should do this because it would make users aware of masquerading
and its dangers.
7. How might someone masquerade as someone else when using email or Instant Messaging?
- They can act as if they are someone else; someone who they are really not but claim to
be.
9. What are the three main areas where redundancy should be provisioned?
- Data, network, and power