1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoray [572]
4 years ago
12

The ____ tool allows a user to connect to the active registry database and make changes that are effective immediately. editreg.

exe regedit.exe register.exe chgreg.exe
Computers and Technology
1 answer:
kenny6666 [7]4 years ago
3 0
Regedit is the Answer
You might be interested in
You can enter _____ in a cell to display tomorrow’s date
nikdorinn [45]
You can enter =TODAY[ ] +1 in a cell to display tommorows date

8 0
3 years ago
I cant tell if tubbo is a bee or a goat <br>or could he be human in the smp
JulsSmile [24]

Answer:

Tubbo is a goat or ram on the Dream SMP.

Explanation:

Since Jschlatt was his father and he's a ram, Tubbo is a ram.

8 0
3 years ago
A network administrator is implementing multifactor authentication for employees who travel and use company devices remotely by
devlian [24]

Answer:

A networking administrator is a multi-factor authentication for employees who use company devices by using a VPN. The level of authentication is 802.1X and OTP.

Explanation:

Network administration is the computer network and uses multiple computers. A company and organization uses multiple computers and need a network admin to connect with a different system. Network administrators depend upon the organization. Some duties of the network administration are split and clearly defined such as

Configure the network hardware, servers, and routers

Upgrade the computer networks

Troubleshooting network issues

Assigning the network models

Deploying the software

Managing the servers

Implementing the security and measure

Network administration requires technical competence and will benefit as a network administrator.

For the level of authentication 802.1, X and OTP are suitable for network administration.

5 0
4 years ago
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
Discuss the software development methodology you would use for developing a software product for insurance agents, and state val
nadya68 [22]

Answer:

It depends on what the company will be willing to use and it also depends on their budget

Explanation:

4 0
3 years ago
Other questions:
  • Write a recursive function, len, that accepts a parameter that holds a string value, and returns the number of characters in the
    7·1 answer
  • Cover page styles in the cover page gallery match the preformatted styles in word, making it easier to create a coherent style b
    5·1 answer
  • You recently set up a DHCP server and need to configure your computer to start using it. Click the IPv4 properties option that y
    10·1 answer
  • __________________ fonts use binary code to define each pixel of the letter to be displayed.
    8·1 answer
  • How to double print ona printer that doesnt allow t
    11·1 answer
  • Which of the following is a device that plugs in a usb port on the computer or mobile device and contains multiple usb ports?
    9·1 answer
  • According to Ohm's Law current equals what?
    7·2 answers
  • Replace any alphabetic character with '_' in 2-character string passCode. Ex: If passCode is "9a", output is: 9_
    6·1 answer
  • Mr. Ray is looking for a platform to launch his product. His marketing team advises him to launch the product via as it is free
    15·2 answers
  • JAVA
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!