This preview shows page 1. Sign up to view the full content.
Unformatted text preview: 3. Suppose that an attacker stole a router from an equipment rack in the main data center of a company. What might be this attackers intentions? They could be after the IP address of the company and an easier route into the network. They could also be attempting to modify the router to reroute information to them and return it. 4. Suppose that you are the manager of the IT department at a company that is currently working on several government (military technology) contracts. You are checking the status of some equipment in one of the equipment closets and notice a new wireless access point. Should you be concerned? What would you do? You shouldnt be concerned but you should block that access point from accessing any of the current equipment....
View Full Document
This note was uploaded on 11/07/2011 for the course SEC 120 taught by Professor Unknown during the Spring '11 term at DeVry Addison.
- Spring '11