1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
10

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful.

She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?A. Large number of vulnerabilitiesB. End-of-life systemsC. Lack of vendor supportD. Misconfigurations
Computers and Technology
1 answer:
Alex777 [14]3 years ago
7 0

Answer:

D. Misconfigurations

Explanation:

There are a large number of network security vulnerability with is a continuously increasing as technology evolves. Examples of the vulnerabilities are DOS attacks, reconnaissance attack, spyware, key logger, Malicious ware attacks etc.

There are good ways of mitigating these attacks, but sometime lack of vendor support of network devices and end of life systms, broadens the attacks.

Alyona would discuss option A - C, but not D (Misconfigurations) because it would only imply the capacity of the network team.

You might be interested in
All dogs = 199999990158161231
devlian [24]

Answer:

C=D cause d spells dogs jk I really dont know

3 0
3 years ago
Read 2 more answers
The term ________ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs
dezoksy [38]
The correct answer that would best complete the given statement above would be DIGITAL CONVERGENCE. The term Digital Convergence <span>refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs. Thanks for posting your question. Hope this helps. </span>
5 0
4 years ago
What is the largest possible value that the variable x can have after the code segment executes? 17 17 A 14 14 B 11 11 C 4
Bogdan [553]

Answer:

i dont know sorry man no problem listed

Explanation:

6 0
3 years ago
What are the two main components on the motherboard?
Advocard [28]
<span>A chipset which forms an interface between the CPU's front-side bus, main memory, and peripheral buses. Non-volatile memory chips (usually Flash ROM in modern motherboards) containing the system's firmware or BIOS. A clock generator which produces the system clock signal to synchronize the various components.</span>
6 0
3 years ago
Read 2 more answers
History timeline: who developed what elements first Windows OS and Apple OS?
Harrizon [31]

Answer:

i think bill gates

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • What are the benefits of organizing your thoughts before you begin your speech
    14·1 answer
  • Extinction of a species is always a negative impact on the Earth.<br><br> True<br> False
    8·1 answer
  • When planning a presentation, there are several factors you need to consider. Which of the following is one factor you should co
    8·1 answer
  • When does MMF2 inactivate an Active object? A. When the score is higher than the game's previous high score B. When the player d
    15·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • Question #3
    12·1 answer
  • Discuss at least 1 Microsoft Windows security features that could protect data?
    5·1 answer
  • What is a word processor write any five important features of word processor?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!