1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
2 years ago
11

List three network threats and list the it infrastructure domain that the threat may harm. why/how does those threats harm that

particular domain?
Computers and Technology
1 answer:
ValentinkaMS [17]2 years ago
6 0

Malware,

Advanced persistent threats,

Distributed denial-of-service attacks.

<h3>What are the threats of networks?</h3>
  • There are different kinds of network threats, and each has different goals. Some, like distributed denial-of-service (DDoS) attacks, seek to shut down your network or servers by overwhelming them with requests.
  • Other threats, like malware or credential theft, are aimed at stealing your data.

To learn more about it, refer

to brainly.com/question/23275071

#SPJ4

You might be interested in
Fryshta is using the Help window in PowerPoint to learn about inserting Smart Shapes into a presentation. She currently has a He
Rainbow [258]

Answer: Pin

Explanation:

Pin button is the button that is used for sticking or saving the ideas from the windows or web on that very place.This feature helps in reviewing or getting the idea back later anytime from the window as per users need. User use this button for saving any food recipe, steps of any process, guidelines etc.

  • According to the question, Fryshta can use pin button from the help window for sticking or pinning the steps of inserting shapes in her presentation.She can have a look at the steps whenever she want.
8 0
3 years ago
Which information is required when designing a field? check all that apply.
Alex_Xolod [135]

Answer:

Explanation:

dimensions or calculation

3 0
3 years ago
What are the components that make a computer work?
Schach [20]

Answer: Plastic, metal, rubber, wiring, electricity, technology, wifi,  

Explanation: You need  PLASTIC to make a frame for the computer. METAL

to make an exoskeleton under the plastic frame. RUBBER to hold those loose wires and to make sure the electricity doesn't escape and shock you. ELECTRICITY to charge and make the computer runs.  Technology is used for you to log in and out of your computer and WIFI to make sure it doesn't lag.

8 0
3 years ago
hãy soạn thảo một bản hợp đồng chuyển giao hoặc thu thập thông tin nhằm bán/ mua/ trao đổi thông tin/ tài liệu giữa hai tổ chức.
mariarad [96]

Explanation:

wuwhwhwhshahahabahsgsgagsgshshshsjeushsjsjsiajausudid

idirieieirieeie

iep

7 0
3 years ago
TVBCA has just occupied an old historic building in downtown Pittsburgh in which 15 employees will work.
7nadin3 [17]

Answer:

A. The proposed solution delivers the required result and both optional desired results.

Explanation:

The IEEE 802.11a is the standard code of the wireless communication technology known as WIFI, it is wireless as it requires no cable to connect to a network device. The data transmission rate of the IEEE 802.11a is 1.5 - 54Mbps (mega bit per second). So, the employees in the TVBCA building can wireless connect to the network, which allows them to be mobile and they can also send large CAD files among themselves.

6 0
3 years ago
Other questions:
  • Please look at picture
    10·2 answers
  • Which devices are managed through device management?
    15·2 answers
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • The most accurate readings that you can take on an analog VOM are when the meter's pointer is at the A. center scale. B. extreme
    11·1 answer
  • Which of the following are documents that can help you to review and assess your organization’s status and state of security? Fi
    6·1 answer
  • Give your definition of a view. Based on the Academic Database, identify and describe a scenario where it would be necessary to
    10·1 answer
  • Network address 192.10.10.0<br>​
    12·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    6·2 answers
  • Set screw compression and indenter are all types of
    13·2 answers
  • A(n) ________ will clear all user data and setting changes, returning the device's software to the state it was in when it left
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!