How was security compromised and how did the firewall respond?

Mark works as a Network Security Administrator for uCertify Inc. Mark has been assigned to a task to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company’s icon to mark the progress of the test. Mark successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access. How was security compromised and how did the firewall respond?

Mark works as a Network Security Administrator for uCertify Inc. Mark has been assigned to a task to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company’s icon to mark the progress of the test. Mark successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access. How was security compromised and how did the firewall respond?

A.
Security was not compromised as the webpage was hosted internally.

B.
The attack was social engineering and the firewall did not detect it.

C.
The attack was Cross Site Scripting and the firewall blocked it.

D.
Security was compromised as keylogger is invisible for firewall.

Explanation:
According to the scenario, the attack was social engineering and the firewall did not detect it.



Leave a Reply 0

Your email address will not be published. Required fields are marked *