Question: 1. Risk 2. Attack implementation/Exploitation 3. Controls/countermeasures to mitigate the risk (administrative, technical and/or physical control) 1. Allowing TCP traffic to pass through the firewall

1. Risk 2. Attack implementation/Exploitation 3. Controls/countermeasures to mitigate the risk (administrative, technical and/or physical control) 1. Allowing TCP traffic to pass through the firewall to the domain name system (DNS) 2. Finding a USB drive in your office labeled "important info" 3. A. An attacker, who pretends to be an electrical technician, gainod access to XYZ company and then to one of the switches that connects the LAN of the first floor to the router by using physical social engineering technique
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
