1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
14

Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,

and accounting files stored on it? a. Weak passwords b. Guest accounts c. Organizational d. Units Forests
Computers and Technology
2 answers:
nikitadnepr [17]3 years ago
6 0

Answer:

Weak passwords

Explanation:

  • Weak passwords enable unauthorized access to the network.
  • Hackers use password cracking software and methods such as the brute force method is one of the password cracking techniques.
  • These password cracking techniques are used to generate several possible passwords for a particular username which can result in unauthorized access to a system or network.
  • Weak passwords are easier to crack for the hackers.
  • Weak passwords include same password which is repeatedly used, using date of birth as password, short passwords, passwords that do not contain special symbols, password containing name of a person or common words like hello, abcd.
  • So due to weak passwords the hackers can access your accounts, your  network when you do not change default password of your router and your system can be attacked to steal sensitive information stored on it.
oksano4ka [1.4K]3 years ago
3 0

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

You might be interested in
Write a C++ function for the following:
Nana76 [90]

Solution :

class Account

$ \{ $

public:

$\text{Account}()$;

double $\text{getBalance}$();

void $\text{setBalance}$();

$\text{bool withdraw}$(double bal);

$\text{private}:$

double $\text{balance}$;

}:

$\text{Account}()$ {}

double $\text{getBalance}$()

$ \{ $

$\text{return balance}$;

}

void $\text{setBalance}$(double $\text{balance}$)

$ \{ $

this.$\text{balance}$ = $\text{balance}$;

}

$\text{boolean}$ withdraw($\text{double bal}$)

$ \{ $

if($\text{balance}$ >= bal)

$ \{ $

$\text{balance}$ = $\text{balance}$ - bal;

$\text{return}$ true;

}

$\text{return}$ false;

}

}

4 0
3 years ago
What is the recommended procedure for disconnecting an external hard drive to avoid losing data?
Zina [86]

Answer:

Instruct the operating system to eject the drive before unplugging it.

Explanation:

3 0
3 years ago
A sample member of the list data is a1 = ['male', True] where the second item is True if the person is on the phone.
Ira Lisetskai [31]
Answer:

0

Explanation:
In the lists, indexation starts from 0, because of that in if statement we compare item[0] which is 'male' and 'male', and then males is itterated within for loop.
8 0
3 years ago
Read 2 more answers
The internet and the World Wide Web were results of years of research by Pioneers such as Ray Tomlinson, Vincent Cerf, Vannevar
iren [92.7K]

Answer:

The Internet began as a US Department of Defense network named Advanced Research Project Agency Network (ARPANET) funded by the Advanced Research Project Agency (ARPA, later DARPA). In the 1970s, universities and other educational institutions began sharing this technology. The network grew as more and more users began sharing information.However, the information being shared on this network was very limited because of its government ties. The ARPANET was decommissioned in 1990. This move was followed by the commercialization of the Internet, which allowed it to carry business and personal traffic.

Explanation:

8 0
3 years ago
How do you launch windows on a computer?
alexandr1967 [171]
You shood just be able to tern it on 
5 0
3 years ago
Other questions:
  • Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek res
    15·2 answers
  • How can investors receive compounding returns? A: by selecting a savings account that has a higher interest rate B: by investing
    9·2 answers
  • ____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.
    12·1 answer
  • The main advantage of a solid state drive is:
    5·1 answer
  • Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​
    6·1 answer
  • What is conference proceeding​
    10·2 answers
  • How to make a harmonic mean algorithm in bash Linux?
    15·1 answer
  • Your friend has a great idea for a new app, and she shows you a document that outlines what the app will do. This document is an
    6·1 answer
  • Which visual aids can be used to present large amounts of numerical data from multiple sources? Check all that apply.
    7·1 answer
  • Find the output<br>I need it immediately​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!