1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
14

Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,

and accounting files stored on it? a. Weak passwords b. Guest accounts c. Organizational d. Units Forests
Computers and Technology
2 answers:
nikitadnepr [17]3 years ago
6 0

Answer:

Weak passwords

Explanation:

  • Weak passwords enable unauthorized access to the network.
  • Hackers use password cracking software and methods such as the brute force method is one of the password cracking techniques.
  • These password cracking techniques are used to generate several possible passwords for a particular username which can result in unauthorized access to a system or network.
  • Weak passwords are easier to crack for the hackers.
  • Weak passwords include same password which is repeatedly used, using date of birth as password, short passwords, passwords that do not contain special symbols, password containing name of a person or common words like hello, abcd.
  • So due to weak passwords the hackers can access your accounts, your  network when you do not change default password of your router and your system can be attacked to steal sensitive information stored on it.
oksano4ka [1.4K]3 years ago
3 0

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

You might be interested in
If I delete the emoji free app will I still have the emojis on my phone?
egoroff_w [7]
<span>If you delete the Emoji application from your phone there is a possibility the Emoji's will still hang around. It all depends on the way you set up the app on your phone. Some people opt to have settings and changes to the app saved on their SD card and some don't. If you save updates and changes to the app to your SD card you will still have remnants on your phone after deleting the app</span>
5 0
4 years ago
Read 2 more answers
Which range function creates the following list of numbers?<br> 76 74 72 70 68 66 64 62
baherus [9]

Answer:

they look like even number

Explanation:

2 4 6 8 10 12 -------seeeeee but not hundred percent sure but plz put me in brainlist

4 0
3 years ago
While working on a presentation, Jack lost all the data because he switched off his computer unknowingly. On which of these comp
Lelechka [254]

Random Access memory(RAM) stores data temporary until the computer is switched off

3 0
3 years ago
Read 2 more answers
When web developers specify color values for text or backgrounds, they often represent RGB (red-green-blue) colors using a six-d
neonofarm [45]

Answer: A #3f107f.

Letter B would produce a lighter blue-purple color rather than a darker shade of purple. Letter C would produce a very light purple color. Letter D would produce a Black color, making it very dark and not in the range of being purple.

Letter A would produce a darker shade of purple. As explained in the way that the RGB color hexadecimal uses, the amount of each respective color is 2 digits for each color Red, Green, Blue respectively.  By reducing the amount of each color in the RGB mode, the output will become a darker shade as the RGB mode is an ADDITITIVE type of color mode.

7 0
3 years ago
Green screen is best suited for _____.
motikmotik

Answer:

CGI

Explanation:

Green screen si best suited for Computer Generated Images ( CGI).

3 0
3 years ago
Read 2 more answers
Other questions:
  • Most shops require the technician to enter a starting and ending time on the repair order to track the actual time the vehicle w
    14·2 answers
  • 1.
    8·1 answer
  • What are the most significant differences among structured, object-oriented, and agile methods? what do have in common?
    10·2 answers
  • Identify the output, input, and any missing information for the following problem. George wants to find out how much extra he wi
    15·1 answer
  • Briefly define "address space" and discuss its major tradeoffs (advantages/costs). What problem is it addressing?
    10·1 answer
  • Refer to the exhibit, a technician applies the configuration in the exhibit to an unconfigured router. To verify the configurati
    13·1 answer
  • What is Systems Engineering?
    5·1 answer
  • The gradual wearing away or breaking down of rocks by abrasion is a type of __________________ weathering.
    8·1 answer
  • Compute the average of a list of user-entered integers representing rolls of two dice. The list ends when 0 is entered. Integers
    12·1 answer
  • The ____ statement can be used to eliminate the use of certain (flag) variables.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!