1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
10

Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consi

dered a ______ the network and to the users who must access the network.
Computers and Technology
2 answers:
Svetlanka [38]3 years ago
7 0

Answer: Vulnerability of

Explanation:

The network administrator was able to identify that virus before it led to denial of service to users. Since it has been discovered, it is no longer a threat as measures will be taken to eliminate it. But a virus that was successful uploaded shows how vulnerable the system is or how bad the security protections put in place are. Steps has to be taken to ensure it does not reoccur.

Yuri [45]3 years ago
4 0

Answer:

Threat to

Explanation:

Cyber attackers exploit system and network vulnerabilities to steal or temper with data in the network. They possess programming and networking skills to hack a network. They use malicious softwares or malwares to bypass security policies and to creat and exploit vulnerabilities in the network.

Virus, worm, rootkit, trojan horse, keylogger etc are examples of malware used by cyber attackers or hackers. They are threats to computer systems in a network as they weaken the security of the network.

You might be interested in
Are there protections for people in terms of what data can be collected by different sites?
s2008m [1.1K]
Yes , usually before you sign up for a website or app it will warn you and tell you what the app or website will have access to and what will gained through using the website or app
8 0
4 years ago
5 provisions of computer ethics
Taya2010 [7]

Answer:

1.-Your computer or system should not be used to harm others.

2.-Your cyber knowledge should not be used to steal other people's resources.

3.-One should not use or copy softwares for which you have not paid.

4.-You should not break into someone else's accounts.

5.-Never use other people's resources without their consent.  

brainliest please ;)

7 0
4 years ago
You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web applica
zhenek [66]

Answer/Explanation:

In this scenario, you can:

- look at the existing CloudWatch logs for keywords related to the application error to create a custom metric;

- create a CloudWatch alarm for that custom metric which invokes an action to restart the EC2 instance;

- create alarms that automatically stop, terminate, reboot, or recover your EC2 instances using Amazon CloudWatch alarm actions;

- use the stop or terminate actions to help you save money when you no longer need an instance to be running; and

- use the reboot and recover actions to automatically reboot those instances or recover them onto new hardware if a system impairment occurs.

Cheers

8 0
3 years ago
Who are the founders of Microsoft?
vekshin1

Answer:

Bill Gates, Paul Allen

Explanation:

The two founders of the mega-tech giant are Bill Gates, and Paul Allen. Hope this helps!

8 0
4 years ago
Hard drives have the largest capacity of any storage device. <br> a. True <br> b. False
VMariaS [17]
It's false as they store way lesser than we think
3 0
3 years ago
Read 2 more answers
Other questions:
  • A company ABC asked you to design a simple payroll program that calculates and employee's weekly gross pay, including any overti
    9·1 answer
  • Getting access to web browsing software to install it on a computer or to update your existing software is called _________ .
    9·2 answers
  • A device in electricity that is analogous to a restriction in a water pipe is:
    11·1 answer
  • 2. Write a standalone function partyVolume() that takes accepts one argument, a string containing the name of a file. The object
    14·1 answer
  • a sign is to be hung from the end of a thin pole, and the pole supported by a single cable. your design firm brainstorms the six
    13·1 answer
  • A Windows user right-clicks on his desktop. What is he planning to do?
    10·1 answer
  • Consider the problem of making change for n cents using the fewest number of coins. Assume that each coins value is an integer.
    7·1 answer
  • Write a VB program to convert a temperature from Celsius to Fahrenheit and vice versa.
    15·1 answer
  • Cisco cyber security would classify this email?
    9·1 answer
  • A computer lacks a division instruction and performs iteratively using the technique described on page 300. suppose we wish to e
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!