Describe the root access method of attacking a firewall.

What will be an ideal response?

This method is used when hackers want to return to a network and manipulate its data by using root or administrative access. A hacker attempts to gain this access by either using a back door to sniff the passwords or by using some other programming code to hijack a session and take control of the administrative sessions. The hacker has either already penetrated the firewall or is using a back door for root access. The hacker installs a rootkit that is used for a variety of purposes, such as password sniffing or injecting Trojans into the network after penetrating the root.

Computer Science & Information Technology

You might also like to view...

What is URL an acronym for?

A) Uniform Resource Listing B) Uniform Resource Leap C) Uniform Resource Line D) Uniform Resource Locator

Computer Science & Information Technology

Match the following Resource Monitor tabs with their purpose:

I. Overview II. CPU III. Memory IV. Disk V. Network A. Helps you decide if you have enough primary storage B. A summary of all resource usage C. Helps you see if you are connected to other computers D. Helps you decide if you have enough processing power E. Helps you decide if you have enough RAM

Computer Science & Information Technology