2
Contributors
2
Replies
3
Views
6 Years
Discussion Span
Last Post by cfwebdeveloper
1

A short simple answer defined here as well as some other good little tid bits, but if this is for homework I suggest you really get out and do some research. Your teacher probably isn't going to be impressed with a one sentence answer to this. Anyway by gaining the trust of a computer that is trusted by the target network you can bypass alot of security. Have a look here transitive attack.

0

This is not a homework assignment lol. Thank you for your post! There are new materials in the 2011 Security+ that I couldn't find a solid answer to.

This question has already been answered. Start a new discussion instead.
Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.