1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lady bird [3.3K]
3 years ago
12

A ____________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a_____________

_ is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
Computers and Technology
1 answer:
seraphim [82]3 years ago
7 0

Answer:

The answer to this question is vulnerability and risk.

Explanation:

Vulnerability is there us misconfiguration in the system  and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.

Risk is when there are chances that a misconfiguration  might happen in our system in future so that hacker could gain unauthorized access to the system.

You might be interested in
As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
Delvig [45]

Answer:

192.168.0.0 / 255.255.255.192

Explanation:

Given:

As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a minimum of 52 hosts. Management requires that a single mask must be used throughout the Class C network.

Solution:

192.168.0.0 / 255.255.255.192 is a private IP network and mask that would meet the requirements.

8 0
3 years ago
Gina is a database user and her supervisor has asked her to generate a report from the structured database. Gina does not know h
const2013 [10]

Answer: C. Query builder

Explanation:

Based on the information given in the question, since Gina does not know how to write SQL commands and no forms have been created, the best option to generate the report is a query builder.

With the Query Builder, Gina can be able to search and also select and filter the database objects, while also creating relationships between the objects, and save queries despite not having any SQL knowledge.

4 0
3 years ago
Why is an outfitting a workspace with video games in a technology development company considered a strategic use of money
Ne4ueva [31]

It is considered a strategic use of money as it  attracts talented computer programmers out there

7 0
4 years ago
Read 2 more answers
Let's suppose you have two primary tasks for your computer: 1. You want to play online video games like World of Warcraft or Hal
Setler79 [48]

Answer:

To download torrents of free television and radio shows.

Explanation:

The internet is a global wide area network, since it connects devices globally for easy data sourcing. The traffic on the internet depends on the bandwidth it's medium can allow and the size of the packets being transferred.

The transfer of packets based on it's use or application is very important. Some packets like video and audio packets needs a certain level of bandwidth, to avoid distortion of the media file. When the bandwidth is low, the video or audio buffers and streams are skipped sue to packet lose due to propagation delay.

6 0
3 years ago
Your supervisor has asked you to help with the orientation of three new office employees. Topics you're asked to present include
Crazy boy [7]

Answer:

Policy manual

Explanation:

A written document that is designed by the company to decide the rules and regulations for the employee to guide them about attendance and evaluation to achieve the desired goals is called Policy manual.

A handbook is provided to the employee at the time of joining of Job. All the policies related to employee such as dress code, attendance policy and evaluation policy. All the rules and regulations related to office are also present in this document.

The purpose of this document is to inform the new employees about guidelines of the company.

7 0
4 years ago
Other questions:
  • What does a shutter speed of 1 mean
    5·2 answers
  • Investments in data networks, ip addresses, routers, and switches are ________ because of their impact on productivity, security
    14·1 answer
  • How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
    14·1 answer
  • I want to know why almost every single "expert answer verified" thing I come across is wrong. If it's wrong, why the h is it exp
    8·2 answers
  • With his assembly lines, Henry Ford improved what process? A. computer management B. just-in-time management C. Bessemer process
    5·1 answer
  • Behave online in the same way as you wish to be treated true false​
    6·1 answer
  • Any Danganronpa fans around here? I'm bored.
    13·2 answers
  • In the Business world people are often measured by their???
    14·1 answer
  • 16
    7·1 answer
  • you're troubleshooting an ip addressing issue, and you issue a command to view the system's tcp/ip configuration. the command yo
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!