1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
5

The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q

uestion 12 options:
Computers and Technology
1 answer:
ivanzaharov [21]4 years ago
3 0
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

You might be interested in
What attributes a website indicates a more reliable source for information
sweet-ann [11.9K]
An attribute of a website that will indicate a more reliable source of information is when the site ends in ".edu". It is a top level domain for education. It would mean that this particular site is linked with universities, colleges or other educational sites thus it gives more information that are real and factual.
3 0
4 years ago
Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices a
const2013 [10]

The self-contained APs are autonomous, or independent, because they are separate from other network devices and even other autonomous AP,these are referred to as the Fat APs

Explanation:

A <u>fat AP wireless access poin</u>t is used to manage wireless client. In other words it can provide wireless access independently.It can handle encryption,authentication,and management of communication of client devices.

There are two types of wireless access points, <u>intelligent (fat) and thin wireless access points. </u>

A thin access point can be a radio and antenna, that is  controlled by a wireless switch.

Some  role of Fat APs include

  • It controls the functionality of a central switch
  • It provides for the  Encryption of connected client devices
  • It Manages the connected client devices
  • It also performs the task of Authentication of the  connected client devices
3 0
4 years ago
Como afecta la robotizacion en las empresas?
kirill [66]

Yo llamaria a esto automatizacion.

Puede reducir los costos al permitir que la empresa emplee a menos personas.

8 0
3 years ago
Cooper Technologies is a technology company that offers many IT services in Chicago. The company's services and products include
natima [27]

Answer: Broad needs and many customers.

Explanation:

Broad needs along with many customers is the strategic position technique in which customers are served with the service and product through a certain channel and ways.It is used for fulfilling the numerous needs of customers in a way that other competing companies cannot serve.

  • According to the question,Cooper technologies is using broad needs and many customers strategic positioning to serve its various customers with services like repair, computer training,tracking etc.
  • Thus, they are handling numerous needs of their many customers.
5 0
4 years ago
In Windows-based systems, a value that specifies the rights that are allowed or denied in an access control entry (ACE) of an ac
blsea [12.9K]

Answer:

C. Access mask discretionary.

Explanation:

Access_Mask is the value that defines the rights used in access control entries (ACE), this value identifies if the trustee is allowed to access a secured object.

It can define rights in three categories: Standard, specific and generic rights.

4 0
3 years ago
Other questions:
  • Invention I chose was radio.
    9·1 answer
  • Usually, the same software that is used to construct and populate the database, that is, the DBMS, is also used to present ____.
    11·1 answer
  • After you have created at least four slides, a scroll bar containing scroll arrows and scroll boxes will appear on the right edg
    9·1 answer
  • Write motivation of cache memory​
    9·1 answer
  • Complete the output for the following program?
    10·1 answer
  • Modify your previous exercise to determine if the user can ride a rollercoaster. To ride the rollercoaster, you must be at least
    12·1 answer
  • Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users im
    8·1 answer
  • The default print setting for worksheets is________
    13·1 answer
  • Previous
    11·1 answer
  • mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!