Answer:
what
Explanation:
uhh this isnt complete or something i dont know what this is im gonna answer it for the points
Answer:
Troubleshooting
Explanation:
These actions are called troubleshooting.
Troubleshooting is used to diagnose the unexpected error while you are performing some action on the computer. For example
You are running skype, and a one-day mic or sound performing unexpected error. What will you do? You have to perform the troubleshooting for MIC and sound to diagnose the problem.
During troubleshooting, you will wizard through steps of the procedure to diagnose the problem step by step. If the problem will be identified, the solution will be suggested.
You may experience sometimes your Wifi router at home not working. For this to identify the unexpected error you will perform the troubleshooting.
In short, troubleshooting is used to diagnose unexpected error while performing some action on the computer. If troubleshooting does not work, then close all the programs running on your machine, then shut down your computer. Wait a couple of minutes, and then start your computer and see, the problem may have been alleviated.
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Answer:
Last Option is correct answer. ( Option D)
Explanation:
Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.
Option B is rejected because again it will not facilitate the different profile requirement.
Option C is not answer because It will only help in viewing the data and granting permission.
Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.