1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
4 years ago
7

A(n) ____ is an attack that takes advantage of a system vulnerability.

Computers and Technology
1 answer:
jarptica [38.1K]4 years ago
8 0
<span>Exploit -</span> An attack that takes advantage of a system vulnerability, often<span> due to a combination of one or more improperly configured services.</span>
You might be interested in
Which of the following devices can be connected to a network? Check all of the boxes that apply.
Diano4ka-milaya [45]

Answer:

1, 2, 4, 6

Explanation:

5 0
3 years ago
While shopping online, Tucker visits a website that looks outdated and has limited reviews. Which of the following strategies sh
Otrada [13]

Answer:

Evaluate source credibility

Explanation:

cuz it is

4 0
3 years ago
Consider a tcp connection between host b and server
katrin2010 [14]
TCP stands for Transmission Control Protocol for Communication of the Internet.  It is used to  interconnect network devices on the Internet and it is a connection oriented protocol which means that the connection between the devices (in our case host b and sever C) is established and maintained until they finish to exchange messages. Source port number specifies the <span>application or services on host b and destination port number on host c. 
a. </span><span>The source and destination port numbers for the segments traveling from host c to host b are : source: 443 , destination: 2345.
b. From the destination port number (443) we can deduce that the server c that it is a web server. Port 443 is the standard port number for website which use SSL</span><span>(</span>Secure Sockets Layer<span>) .SSL is the standard security technology for establishing an encrypted link between a web server and a browser. </span>
7 0
3 years ago
your manager has asked you to implement a network infrastructure that will accommodate failed connections. which of the followin
Softa [21]

The <u>Mesh</u> network topologies provides redundancy for a failed link.

What are network topologies?

A communication network's topology refers to <u>how its components are organized.</u> Command and control radio networks, industrial fieldbuses, and computer networks are just a <u>few examples of the several types of telecommunication </u><u>networks </u><u>that can be defined or described using </u><u>network topology</u><u>.</u>

There are eight fundamental topologies that can be identified by studying network topology: <u>point-to-point, bus, star, ring or circular, mesh, tree, hybrid, or daisy chain.</u>

Examples of physical network topologies include star, mesh, tree, ring, point-to-point, circular, hybrid, and bus topologies. <u>Each of these </u><u>networks </u><u>consists of a unique arrangement of nodes and links.</u>

To learn more about network topologies, use the link given
brainly.com/question/13818848
#SPJ4

4 0
1 year ago
ABC Manufacturing Company is located in Hiroshima, Japan. Being prone to earthquakes, the company decided to implement a backup
maxonik [38]

The command interface protocol that I would suggest to the IT administrator is Secure Shell (SSH).

<h3>What is a command interface protocol?</h3>

A command interface protocol can be defined as a standard protocol that is designed and developed to processes commands in the form of lines of text to a software program that is installed on a computer system.

<h3>The types of command interface protocol.</h3>

In Computer technology, there are different types of command interface protocol and these include:

  • SSL
  • TLS
  • SSH

SSH is an acronym for Secure Shell and it is a standard network protocol that gives a IT administrator a secure way to access data over an unsecured network, especially when backing up data.

Read more on SSH here: brainly.com/question/17147683

7 0
2 years ago
Other questions:
  • Interactive media professionals are unique among other Information Technology professionals because they
    7·1 answer
  • Select the strategies below that are likely to increase audience attention.
    14·2 answers
  • Which class of fire extinguisher is appropriate for a fire involving electrical/energized electrical equipment?
    13·2 answers
  • You have an interface on a router with the IP address of 192.168.192.10 /29. What is the broadcast address the hosts will use on
    15·1 answer
  • Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single i
    15·1 answer
  • Gear systems with __________ can have both drive and driven gears on the same shaft. a. an odd number of gears b. an even number
    6·1 answer
  • Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
    15·1 answer
  • Which line of code will cause the loop to execute exactly one time?
    13·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • A computer lacks a division instruction and performs iteratively using the technique described on page 300. suppose we wish to e
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!