138k views
3 votes
Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now considered a ______ the network and to the users who must access the network.

User Mpiktas
by
2.7k points

2 Answers

4 votes

Answer:

Threat to

Step-by-step explanation:

Cyber attackers exploit system and network vulnerabilities to steal or temper with data in the network. They possess programming and networking skills to hack a network. They use malicious softwares or malwares to bypass security policies and to creat and exploit vulnerabilities in the network.

Virus, worm, rootkit, trojan horse, keylogger etc are examples of malware used by cyber attackers or hackers. They are threats to computer systems in a network as they weaken the security of the network.

User Gym
by
3.4k points
4 votes

Answer: Vulnerability of

Step-by-step explanation:

The network administrator was able to identify that virus before it led to denial of service to users. Since it has been discovered, it is no longer a threat as measures will be taken to eliminate it. But a virus that was successful uploaded shows how vulnerable the system is or how bad the security protections put in place are. Steps has to be taken to ensure it does not reoccur.

User Hyeri
by
3.1k points