1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
3 years ago
12

A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP

address in a foreign country. An investigation determines that the firewall has not been altered, and antivirus is up-to-date on the workstation. Which of the following is the MOST likely reason for the incident?
A. MAC Spoofing
B. Session Hijacking
C. Impersonation
D. Zero-day
Computers and Technology
1 answer:
Sav [38]3 years ago
4 0

Answer:

D. Zero-day

Explanation:

It is clearly stated that the antivirus is still up-to-date on the workstation, and there has been no alterations to the firewall. Hence, this means the software is functional and up-to-date with all known viruses. This shows that this attack is unknown to the manufacturer of the antivirus software and hence no virus definition or patch fixing this problem has been developed yet. In this light, it is a zero-day.

A zero-day is a type of vulnerability in a software that is not yet known to the vendor or manufacturer, hence this security hole makes the software vulnerable to attackers or hacker before it is been fixed.

You might be interested in
The function of while loop is
Alona [7]

Answer:

B repeat a chunk of code until the condition is true im 88% sure

4 0
2 years ago
What is the Multiplier if the change in RGDP is $525,000,000 and initial spending is $100,000?
OLEGan [10]
The right answer is A
4 0
3 years ago
Which line of code will print I can code on the screen?
KIM [24]

Answer: print("I can code")

Explanation:

luckily im a coder

5 0
3 years ago
Formatting. Given input that represents a floating point number, that is, made up of digits and at least one decimal point, conv
Ronch [10]

Answer:

s = input("Input a float: ")

print("{:12.2f}".format(float(s)))

Explanation:

  • Read a number  from user using the input function of Python.
  • Use the format function of Python to correctly format the output according to the given requirements.
  • Note: Use Python 3.6 or above for this code to run without any issue.

Output:

Input a float: 1234.56789

1234.57

3 0
3 years ago
if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the follo
Dominik [7]

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at brainly.com/question/14793460.

#SPJ4.

4 0
1 year ago
Other questions:
  • Which program or security application prevents access between a private and trusted network, and other untrusted networks?
    8·2 answers
  • What is a geotag?
    10·1 answer
  • What is the fundamental problem producers and consumers face?
    12·1 answer
  • When selecting text in word, holding down the ctrl key while clicking the mouse button will select the?
    15·1 answer
  • Discuss the importance of employee security awareness training. What innovative ways should company’s implement security trainin
    14·1 answer
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • Pls help me
    5·1 answer
  • In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web clie
    7·1 answer
  • Part 2: Code the Program
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!