1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
5

The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q

uestion 12 options:
Computers and Technology
1 answer:
ivanzaharov [21]4 years ago
3 0
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

You might be interested in
A benefit of IPsec is __________.
Montano1993 [528]

Answer:

Option (4) is correct answer

Explanation:

IPsec stands for Internet protocol security. It is a protocol that works between two communication points. It provides integrity, confidentiality and data authentication for any network. It is used for Virtual private network.  There are two types of VPN, From which an organization needs to choose one.

IPsec and OpenSSl in which IPsec VPN uses IP security.

Benefits of this network are as follows--

  • Option 1 states that it works after the transport layer which is true.
  • Option 2 states that when any user leaves the organization they have no need to take back the martial which he had already provided to the organization which is also the benefit of IPsec.
  • Option 3 states that it provides security that is also correct because it is a protocol that is designed to provide security.

Hence option D (all of the above ) are correct.

3 0
3 years ago
bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a
storchak [24]

As an IT technician, I need to understand how to end processes on the process tab of the task manager. Most techies are interested in this tab to determine what process is consuming what resources. Bryce’s computer has a suspicious application that has 90% CPU consumption, and this, as a result, will affect the computer.

  • First on the list of things that I am required to identify the actual application that is causing the surge  on the CPU column,
  • Next I should be able to right click on it, and select End process on Windows 7 or End task on Windows 8 and later. Carrying out this task will noticeably stabilize Bryce’s computer.
  • Finally, I will try to find out whether this application is causing harm to the computer in any possible way. If it is, then I should consider uninstalling it. If it not, I should be able to request Bryce to do an upgrade on his PC in order to handle the application more effectively.

6 0
3 years ago
When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
Kobotan [32]
The words where you want to begin the selection. Just <span>hold </span>down<span> the left </span>mouse button<span>, and then drag the pointer over the </span>text<span> that you want to </span><span>select</span>
5 0
4 years ago
What important practice can help prevent hardware trouble?
sleet_krkn [62]
<span>C. Maintenance is an important practice can help prevent hardware trouble. Maintenance involves operational and functional checks, servicing, repairing or replacing if necessary. Maintenance has two types which are </span>preventive or scheduled maintenance and corrective maintenance. Inspecting, maintaining and protecting a device, equipment or facilities before breaking down or other problems occur it is called preventive while corrective is when it is repaired or replaced after wear, malfunction or break down.

 

 


3 0
3 years ago
Multiple Choice
anygoal [31]

Answer:

cyptographically

Explanation:

Did this question and got it right. Good luck!

6 0
2 years ago
Other questions:
  • Which symbol is used to separate a worksheet name from a cell reference?
    10·1 answer
  • if there are several web pages that you visit regularly what can you do to make accessing them more efficient?
    13·1 answer
  • A _____ is the useful part of a transmission through a network.
    15·1 answer
  • Help me plase will give brainliest
    12·2 answers
  • Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
    11·1 answer
  • How are Earth's plates made?
    14·1 answer
  • Explain the integer and float datatypes with example.<br><br>​
    11·1 answer
  • A software giant is enabling a city with smart parking, using real-time information captured by sensors on the vehicle and senso
    7·1 answer
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
  • The _________________ can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstall
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!