Skip to content

Commit

Permalink
correct c5w1 assessment (elmoallistair#8)
Browse files Browse the repository at this point in the history
* correct answers c5w1 assessment

* update c5w1 submission grade

Co-authored-by: Elmo <[email protected]>
  • Loading branch information
JeffreyBytes and elmoallistair authored Dec 23, 2021
1 parent 42eb6c6 commit c7320ad
Showing 1 changed file with 6 additions and 6 deletions.
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
## Understanding Security Threats
**Latest Submission Grade: 84.61%**
**Latest Submission Grade: 92.30%**

<br>

Expand All @@ -20,8 +20,8 @@ A network-based attack where one attacking machine overwhelms a target with traf

When cleaning up a system after a compromise, you should look closely for any ______ that may have been installed by the attacker.

* Poisoned DNS caches [INCORRECT]
* Backdoors
* Poisoned DNS caches
* **Backdoors**
* Rogue APs
* Injection attacks

Expand All @@ -31,10 +31,10 @@ When cleaning up a system after a compromise, you should look closely for any __

A(n) _____ attack is meant to prevent legitimate traffic from reaching a service.

* Denial of Service
* **Denial of Service**
* Injection
* Password
* DNS Cache poisoning [INCORRECT]
* DNS Cache poisoning

<br>

Expand Down Expand Up @@ -164,4 +164,4 @@ An attacker, acting as a postal worker, used social engineering tactics to trick
* Spoofing
* **Social engineering**

> Social engineering is an attack method that relies heavily on interactions with humans. Humans will always be the weakest link in a security system.
> Social engineering is an attack method that relies heavily on interactions with humans. Humans will always be the weakest link in a security system.

0 comments on commit c7320ad

Please sign in to comment.