1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EleoNora [17]
3 years ago
10

A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo

rk shares to which the user had access. The virus was not deleted or blocked by the company's email filter, website filter, or antivirus. Which of the following describes what occurred?
A. The user’s account was over-privileged.
B. Improper error handling triggered a false negative in all three controls.
C. The email originated from a private email server with no malware protection.
D. The virus was a zero-day attack.
Computers and Technology
1 answer:
Leno4ka [110]3 years ago
5 0

Answer:

D

Explanation:

A zero-day vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.

You might be interested in
Who is demonstrating entrepreneurship?
Taya2010 [7]

Answer: D: A recent graduate makes money helping teachers sell their lesson plans online.

Explanation: I am in accounting and have taken it for 3 years.

4 0
3 years ago
Joann wants to save the building block she created for the title of her company.
konstantin123 [22]

Answer:

HTML BUILDING BLOCKS

Explanation:

4 0
3 years ago
Read 2 more answers
Briefly describe the concept of network topology change and explain how these can be dealt with using Routing Information Protoc
Natasha2012 [34]

Answer: network topology is the arrangement of nodes which includes routers and switches so that enables connection between the server and the client.

however due to times when there is huge traffic in the nodes there needs to be an optimal path for the exchange of information which is accomplished by different routing protocols.

Explanation:

Routing Information Protocol(RIP) is one such protocol which enables to route packets from the source to the destination having the least possible traffic along its path. There are two sets of routing algorithm which are

1. Static routing protocols

2. Dynamic routing protocols.

The difference between the two is that dynamic routing protocols helps to construct the routing tables dynamically as compared to static routing.

RIP is a type of dynamic routing whereby it sends the contents of its routing table the adjacent routers every 30 seconds and whenever a route is discarded from the routing table it is marked as unusable.

RIp is supported by almost all routers and also supports load balancing which is one of it advantages.

8 0
3 years ago
Write a C++ program to find if a given array of integers is sorted in a descending order. The program should print "SORTED" if t
LenKa [72]

Answer:

The cpp program for the given scenario is as follows.

#include <iostream>

#include <iterator>

using namespace std;

int main()

{

   //boolean variable declared and initialized  

   bool sorted=true;

   //integer array declared and initialized

   int arr[] = {1, 2, 3, 4, 5};

   //integer variables declared and initialized to length of the array, arr

   int len = std::end(arr) - std::begin(arr);

       //array tested for being sorted

    for(int idx=0; idx<len-1; idx++)

    {

        if(arr[idx] < arr[idx+1])

           {

               sorted=false;

            break;

           }

    }

    //message displayed  

    if(sorted == false)

     cout<< "UNSORTED" <<endl;

 else

    cout<< "UNSORTED" <<endl;

return 0;

}

OUTPUT

UNSORTED

Explanation:

1. An integer array, arr, is declared and initialized as shown.

int arr[] = {1, 2, 3, 4, 5};

2. An integer variable, len, is declared and initialized to the size of the array created above.

int len = std::end(arr) - std::begin(arr);

3. A Boolean variable, sorted, is declared and initialized to true.

bool sorted=true;  

4. All the variables and array are declared inside main().

5. Inside for loop, the array, arr, is tested for being sorted or unsorted.  The for loop executes over an integer variable, idx, which ranges from 0 till the length of the array, arr.

6. The array is assumed to be sorted if all the elements of the array are in descending order.

7. If the elements of the array are in ascending order, the Boolean variable, sorted, is assigned the value false and for loop is exited using break keyword. The testing is done using if statement.

8. Based on the value of the Boolean variable, sorted, a message is displayed to the user.

9. The program can be tested for any size of the array and for any order of the elements, ascending or descending. The program can also be tested for array of other numeric data type including float and double.

10. All the code is written inside the main().

11. The length of the array is found using begin() and end() methods as shown previously. For this, the iterator header file is included in the program.

4 0
3 years ago
How do you know that the computer is infected by virus​
Olegator [25]
  1. Slow computer performance (taking a long time to start up or open programs)
  2. Problems shutting down or restarting.
  3. Missing files.
  4. Frequent system crashes and/or error messages.
  5. Unexpected pop-up windows.
6 0
2 years ago
Other questions:
  • You discover many errors in a database table. What has been lost?
    15·2 answers
  • Number of frames displayed per second
    15·1 answer
  • What limited the possibilities of game development from a technical viewpoint?
    7·1 answer
  • Assume the availability of a function called printStars. The function receives an int argument. If the argument is positive, the
    5·1 answer
  • There are four types of characteristics attributed to a flow: reliability, delay, jitter, and bandwidth. Explain how each of the
    8·1 answer
  • Question 1
    10·1 answer
  • Which of these conclusions supports the fact that Eclipse is categorized as an IDE?
    8·1 answer
  • Where do animators work?
    6·1 answer
  • Which case would benefit from Explainable Artificial Intelligence (AI) principles?
    5·2 answers
  • 10. Site-to-Site VPN architecture is also known as
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!