1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GaryK [48]
4 years ago
12

A network administrator identifies sensitive files being transferred from a workstation in the LAN to an unauthorized outside IP

address in a foreign country. An investigation determines that the firewall has not been altered, and antivirus is up-to-date on the workstation. Which of the following is the MOST likely reason for the incident?
A. MAC Spoofing
B. Session Hijacking
C. Impersonation
D. Zero-day
Computers and Technology
1 answer:
Sav [38]4 years ago
4 0

Answer:

D. Zero-day

Explanation:

It is clearly stated that the antivirus is still up-to-date on the workstation, and there has been no alterations to the firewall. Hence, this means the software is functional and up-to-date with all known viruses. This shows that this attack is unknown to the manufacturer of the antivirus software and hence no virus definition or patch fixing this problem has been developed yet. In this light, it is a zero-day.

A zero-day is a type of vulnerability in a software that is not yet known to the vendor or manufacturer, hence this security hole makes the software vulnerable to attackers or hacker before it is been fixed.

You might be interested in
Write an application that accepts a word from a user and converts it to Pig Latin. If a word starts with a consonant, the Pig La
Scorpion4ik [409]

Answer:

Written in Python

word = input("Word: ")

if(word[0]=='a' or word[0]=='e' or word[0]=='i' or word[0] =='o' or word[0]=='u'):

     print(word+"ay")

else:

     a = word[1:]

     print(a+word[0]+"ay")

Explanation:

<em>The program was written in Python and I've added the explanation as an attachment; where I used comments as explanations</em>

Download txt
7 0
4 years ago
You have been hired as a Systems Analyst in a famous Burger chain. Due to its popularity, the demands from customers also increa
IceJOKER [234]

a. Assume you are preparing a Customer Satisfaction Questionnaire. What types of questions would you include? Prepare 5 questions that you would ask.

The questions that I would ask would be designed in order for me to know whether our organizational programs have translated to a lower customer satisfaction. Examples of those questions would be:

1. Do you enjoy eating at our place?

2. How would you compare our service  in the past to our service now?

3. How likely are you to recommend our restaurant to your friends?

4. Is there any area where you think we could improve?

5. Do you have any other suggestions for us?

b. What type of questions would you ask the waiters and cooks during the interview? Prepare 5 questions (each) that you would ask waiters and cooks.

I would ask questions that would allow me to determine whether these people are able to work in a fast-paced environment. For example:

1. How good are you at working under pressure?

2. Do you find busy environments stressful?

3. Are you good at multitasking?

4. Have you worked at a busy restaurant before?

5. Do you have a cooperative spirit?

c. What modern requirements determination methods are appropriate for this project?

Prototyping is the requirement that would most help in this task.

7 0
3 years ago
Which wildcard characters will return a single character when using the Find dialog box?
scoray [572]

Answer:

?

Explanation:

It is the "?" character. When we type in the ? in the regular expression, then it means that it will be replaced by a single character. And when we type *, then we mean there can be multiple, and any number of characters. And this is what is meant by these two wildcard characters. Hence, the correct option here is ?.

Example: ?op can be top, pop, etc, and we can see here that, ? is replaced by only one character each time.

7 0
3 years ago
Read 2 more answers
Which set of technologies that support knowledge management is characterized by mashups, blogs, social networks, and wikis? a. X
Neporo4naja [7]

Answer: c) Web 2.0

Explanation:

Web 2.0 is the technology that consist applications and websites for the people to interact and sharing information, activities, event and other materials through social media components like blog, social networking sites,wikis, podcast etc.

  • Other options are incorrect because artificial intelligence, ERP(Enterprise resource planning) and XML(Extensible Markup Language) are not the tools that is used by users for interaction and communicating with the help of social media components.
  • Thus, the correct option is option(c).
3 0
3 years ago
Please help!!!! will mark brainliest!!
fgiga [73]

Answer:

1. Speaking or texting on the cell phone while driving.

= It cause an accident.

2. Using technology for bullying others.

Hope this answer will help you.

7 0
3 years ago
Read 2 more answers
Other questions:
  • An employee at your graphic design firm needs a solid computer that can handle the variety of graphics and animations he works w
    7·2 answers
  • Which of the following declares an abstract method in an abstract C++ class? (Points : 2) public: void print();
    14·1 answer
  • The DNS server at your headquarters holds a standard primary zone for the abc domain. A branch office connected by a slow WAN li
    14·1 answer
  • Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
    6·1 answer
  • TRUE OR FALSE! A query can have no more than three common interpretations.
    10·1 answer
  • Sadie helman runs a web site for amateur snowboarders. she likes to post videos and music related to snowboarding on her site as
    12·1 answer
  • What is network and also how many types of network are there as well
    6·2 answers
  • You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
    8·2 answers
  • 1. Complete the following program so that it computes the maximum and minimum of the elements in the array. Write the program so
    6·1 answer
  • Which of the following is an example of machine learning?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!