1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
4 years ago
14

vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa

lse
Computers and Technology
1 answer:
Nookie1986 [14]4 years ago
3 0
Hi
i just saw this question and i like to answer it
true
You might be interested in
How good are vw beetle heaters in winter?
Vinvika [58]
It depends on the heater but in most case it works pretty well
7 0
3 years ago
A startup disk cannot be detected when booting a computer. The disk's pressence is reported by the system firmware, But Windows
olasank [31]

Answer:

Bootrec.exe

Explanation:

The process of turning on a computer system is called booting. When a computer system boots, it runs the post test and loads into memory, the information or program needed to run the operating system, and then locates the operating system from the boot manager record in the disk partitions. When the disk is failed to be recorded, or the boot manager or sector is corrupt or lost, the bootrec.exe command is used in the command prompt to correct these problems.

8 0
3 years ago
Complete the statement below with the correct term.
kvv77 [185]

Answer:

clone

Explanation:

Many manufacturers always ensure their products are accompanied by a user manual and and a driver in a CD or can be obtained from their website to guide users on how to operate the device.

If the device has neither, it means it has been refurbished or its an imitation of the original make.

Cloned devices can easily malfunction and trouble shooting them tends to be a matter of guess work. Compared to the real device, their prices are normally  cheap compared to the real devices.

7 0
3 years ago
Read 2 more answers
Identify requirements that should be considered when determining the locations and features of firewalls. What are some importan
Karo-lina-s [1.5K]

Answer and Explanation:

The requirements to be considered while determining the firewalls' features and locations are:

  • The reason so as to why to implement a firewall
  • Traffic inspection type required to be accomplished.
  • Best OS, i.e., Operating System suitable for the work need.
  • The method to fir firewall into the topology (network).
  • Making decision whether the firm is more suitable for software solution or application.

Some of the importants steps to be taken for the firewalls to remain effective:-

  • Use of strong password.
  • according to the usage, tweak the settings of the firewall.
  • Enable auto update for firewall.
  • Maintain consistency in settings throughout the network.
  • addition of multiple layers to the security and computer system.
  • Application of encryption (128 bit WEP).
  • Analysis of the traffic both outbound and inbound and taking appropriate measures.
  • Always check for leaks and ports.
8 0
3 years ago
11. What are the two DFS models?12.When you move a file from the Spreadsheets folder to the Corp Documents folder on a Windows S
Vesnalui [34]

Answer/Explanation:

11. Standalone and Domain-based models

12. The moved file takes with it the permission it had in the Spreadsheets folder.

Cheers.

7 0
3 years ago
Other questions:
  • A hierarchical addressing scheme is used
    15·1 answer
  • Which of the following commands would I use to begin a new presentation?
    14·1 answer
  • A digital device Select one: a. uses electricity to run it. b. uses symbolic representations of data in the form of code. c. req
    7·1 answer
  • What are computers used for?
    14·2 answers
  • Need help with these
    5·1 answer
  • The ‘capacity for emergency management and response personnel to interact and work well together’ describes which of the key com
    10·2 answers
  • Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given th
    15·1 answer
  • What is typeface
    11·2 answers
  • HELP ME ON THIS PLEASE ILL GIVE BRAINLY!!!! If U GET IT RIGHT !!!
    10·1 answer
  • 8. Give regular expressions with alphabet {a, b} for
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!