1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
1 year ago
8

your enterprise experienced several technical issues over the last few days. there were multiple instances of passwords needing

to be changed and other issues causing downtime. management has started receiving voicemails regarding fraudulent activities on their accounts. while the voicemails sound authentic, the help desk concludes that they are fake. what type of malicious activity will this be considered?
Computers and Technology
1 answer:
Eva8 [605]1 year ago
8 0

A type of malicious activity which this will be considered as is: vishing.

<h3>What is a password policy?</h3>

A password policy can be defined as a set of rules and standard that are designed and developed by the data security or networking team of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

  • Maximum age of pass.
  • Password minimum length.
  • Password combination.

<h3>What is social engineering?</h3>

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

In Computer technology, some examples of social engineering attacks include the following:

  • Quid pro quo
  • Spear phishing
  • Baiting
  • Tailgating
  • Water-holing
  • Pretexting
  • Phishing
  • Vishing

<h3>What is vishing?</h3>

Vishing is an abbreviation for voice phishing and it can be defined as the use of telephony (telephone communication) to conduct phishing attacks.

In this context, we can reasonably infer and logically conclude that a type of malicious activity which this issue will be considered as is vishing.

Read more on Vishing here: brainly.com/question/14220906

#SPJ1

You might be interested in
.Write a program that reads in the length and width of a rectangular yard (in meters) and the length and width of a rectangular
nata0808 [166]
What is the language you want for the code?
3 0
3 years ago
Write any two features of Guided media​
BaLLatris [955]

Answer:

<h3>Guided media, which are those that provide a conduit from one device to another, include twisted-pair cable, coaxial cable, and fiber-optic cable. Guided Transmission Media uses a "cabling" system that guides the data signals along a specific path. The data signals are bound by the "cabling" system.</h3>

pa brainliest po thank you

6 0
3 years ago
The most commonly used traffic control devices used in road construction and maintenance work areas are
svet-max [94.6K]
The answer that best completes the statement above is this: <span>signs, barricades, drums, cones, tubes, flashing arrow panels, and flag individuals. The main purpose of these traffic control devices is to signal the drivers to stop or to slow down and to change lanes most especially in areas that are undergoing construction.</span>
3 0
3 years ago
Data erasure software uses standards that are called.
Leviafan [203]

Data erasure software uses standards that are called Typically, a software program device is used for information erasure like BitRaser, which implements the overwriting sample primarily based totally on the usual used, together with US DoD 5220.22, NIST 800-88.

<h3>What is statistics erasure?</h3>

For virtual garage devices, erasing names after its developer, the Gutmann set of rules is a way of disk wiping that overwrites statistics the usage of a complete of 35 passes. This makes it one of the maximum steady statistics erasure methods, however additionally the maximum time-consuming.

The statistics manner that zeros and ones are verifiably overwritten onto all sectors of the device. This renders all statistics completely unrecoverable at the same time as retaining the capability of the device the beyond few years, NIST Special Publication 800-88 has end up the go-to statistics erasure preferred withinside the United States.

Read more about the software :

brainly.com/question/1538272

#SPJ1

8 0
2 years ago
1. The________  member function moves the read position of a file.
emmasim [6.3K]

Answer:

Answers explained with appropriate comments

Explanation:

1. seekp()   //the seekp sets the position where the next character is to be   //inserted into the output stream.

2. fstream  //fstream is used for input and output for files

//just like iostream for input and output data

3. tellp();  //tellp returns the "put" or write position of the file.

4. ios::ate  //ate meaning at the end, sets the file output at the file end

5. binary files  //binary files only store 0s and 1s

6. seekg()  //seekg is used to move write position of the file

7. put  //this is used to "put" or set records or arrays to a single file

8. std::ws , skips //the std::ws is used to discard leading whitespace from an //input stream

9. peek //this looks at the next character in the input sequence

10. get, peak //get and peek do not skip leading whitespace characters

8 0
3 years ago
Other questions:
  • What is the best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried
    15·1 answer
  • Why is there more content on youtube in 4k then there is on cable, satellite, and digital tv combined?
    6·2 answers
  • What is one way in which tablets differ from laptops and notebooks
    12·2 answers
  • Before entering a loop, the first input, or ____, is retrieved.
    14·1 answer
  • Select the correct answer. One of the functions of a data warehouse is to change table names to meaningful names. Which name is
    13·1 answer
  • Who first demonstrated the computer mouse?
    11·1 answer
  • 9.6 Code Practice, this is in Python, I need its quick!
    13·1 answer
  • A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code.
    7·2 answers
  • To read cheques, banks use​
    11·1 answer
  • 1. Microsoft Excel, MS Excel, or simply Excel is a______application by Microsoft Corporation. 2. Excel allows you to organize an
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!