1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
san4es73 [151]
4 years ago
13

What type of Windows Server is the most likely server to be targeted by a computer hacker?

Computers and Technology
2 answers:
Deffense [45]4 years ago
5 0
The answer is Domain Controller
Igoryamba4 years ago
5 0

Answer:

blue hat hacker

Explanation:

the blue hat hacker is someone outside computer security consulting firms who bug tests a system prior to its launch, looking for exploits so they can be closed. Blue Hat Hacker also refers to the security professional invited by Microsoft to find vulnerabilities in Windows.

You might be interested in
Which of the following is a narrative essay most like
lesya [120]
I think it cut off? Doesn’t make any sense
6 0
3 years ago
Read 2 more answers
open your browser and enter the address of this ftp site in the address box: ftp.cengage. if your browser supports ftp, a logon
Licemer1 [7]

FTP access is available from other companies, but access is constrained unless the user first authenticates by supplying a user name and potentially a password.

The files are frequently intended for specific uses rather than for public release. For instance, you must send a letter house your consumer address list. Both businesses would not want the public to have access to these materials in this situation. Software is a collection of instructions, data, or computer programs that are used to run machines and carry out particular activities. It is the antithesis of hardware, which refers to a computer's external components. A device's running programs, scripts, and applications are collectively referred to as "software" in this context. Software refers to the processes and programs that enable a computer or other electrical device to function.

Learn more about software here-

brainly.com/question/985406

#SPJ4

7 0
1 year ago
The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
Reptile [31]

Complete Question:

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

Group of answer choices

a. Router

b. Switch

c. Bridge

d. Hub

Answer:

d. Hub.

Explanation:

A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.

<em>Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.</em>

7 0
3 years ago
How do you tack pictures for this app
olga2289 [7]
There is a paper clip on the bottom left on your screen. When answering a question click it to apply a picture. Have a wonderful day.

(Take*)
3 0
3 years ago
Digital signatures are as legally acceptable as written signatures.
Leto [7]

Answer:

First point and the last point are the correct answer to the given question .

Explanation:

The main objective of the digital signature is to ensure the quality of the document or the message was not changed during the transfer of message in the network.

Following are the advantages of the digital signature

  • As compare to the electronic signature the digital signature is more secure then that of.
  • The signer's signature is seen on the digital signatures as the physical proof.
  • Global recognition, and the compliance with the law.

All the other options are incorrect they are not advantage of the digital signature .

4 0
3 years ago
Other questions:
  • Which of the following is not true about designing classes? In order for class information to be printed instead of a memory add
    12·1 answer
  • Implement a java program to find the smallest distance between two neighbouring numbers in an array.
    7·1 answer
  • FILL IN BLANK FOR THE POINTS!!!!!!
    8·1 answer
  • What does the FixedUpdate loop do? Why do developers use it?
    14·1 answer
  • What is the mest gun in pixel gun 3d imma give you brainliest
    14·2 answers
  • How to make a harmonic mean algorithm in bash Linux?
    15·1 answer
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Write any one method to delete a table in writer​
    11·1 answer
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    8·1 answer
  • With _____ technology, a web server delivers information to users, who have signed up for the service, instead of waiting for th
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!