1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
10

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful.

She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?A. Large number of vulnerabilitiesB. End-of-life systemsC. Lack of vendor supportD. Misconfigurations
Computers and Technology
1 answer:
Alex777 [14]3 years ago
7 0

Answer:

D. Misconfigurations

Explanation:

There are a large number of network security vulnerability with is a continuously increasing as technology evolves. Examples of the vulnerabilities are DOS attacks, reconnaissance attack, spyware, key logger, Malicious ware attacks etc.

There are good ways of mitigating these attacks, but sometime lack of vendor support of network devices and end of life systms, broadens the attacks.

Alyona would discuss option A - C, but not D (Misconfigurations) because it would only imply the capacity of the network team.

You might be interested in
If I am working in a document and wish to follow a hyperlink, what should I do?
Ksenya-84 [330]

Answer:

Click on the link or copy and paste it to your browser

Explanation:

7 0
3 years ago
Which of the following is true of how computers represent numbers?
Bumek [7]

Answer:

C. Binary can be used to represent more complex, higher level abstractions, including but not limited to numbers, characters, and colors. D. When data is large enough computers switch to using decimal representation instead of binary, because you can represent larger numbers with fewer digits

Explanation:

4 0
3 years ago
Read 2 more answers
Andy is trying to put together a holiday gift knapsack (with W=8) for Sarah. He has n items to choose from, each with infinitely
Sever21 [200]

Answer:

See explaination

Explanation:

Given 3 items: {w1 = 1, v1 = 3}, {w2 = 3, v2 = 2}, {w3 = 4, v3 = 3}

Hence OPT(1) = 3, OPT(3) = 2, OPT(4) = 3

Recursive formula for OPT(k) to minimize value is

OPT(k) = INFINITE if k <= 0

= min(3 + OPT(k-1), 2 + OPT(k-3), 3 + OPT(k-4))

Let us calculate OPT(1) to OPT(8)

OPT(1) = 3

OPT(2) = min ( 3 + OPT(1), 2 + OPT(-1), 3 + OPT(-2)) = 6

OPT(3) = 2

OPT(4) = 3

OPT(5) = min ( 3 + OPT(4), 2 + OPT(2), 3 + OPT(1)) = min(6, 8, 6) = 6

OPT(6) = min ( 3 + OPT(5), 2 + OPT(3), 3 + OPT(2)) = min(9, 4, 9) = 4

OPT(7) = min ( 3 + OPT(6), 2 + OPT(4), 3 + OPT(3)) = min(7, 5, 5) = 5

OPT(8) = min ( 3 + OPT(7), 2 + OPT(5), 3 + OPT(4)) = min(8, 8, 6) = 6

3 0
3 years ago
Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object
NARA [144]

Answer:

Length of char array: sizeof(arr)

Length of a string object: myString.length()

Explanation:

The sizeof approach is generally not recommended, since this information is lost as soon as you pass the array to a function, because then it becomes a pointer to the first element.

4 0
3 years ago
Which is an example of a Boolean operator that evaluates as TRUE?
ladessa [460]

The expression NOT (3+2=7) evaluates as TRUE because is is NOT the case that 3+2=7.

Let me know if you have any questions.

4 0
3 years ago
Other questions:
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • In computers, when the print command is executed, a cable carries this signal from the computer to the printer. In comparing a c
    11·1 answer
  • Given a variable temps that refers to a list, all of whose elements refer to values of type float, representing temperature data
    10·2 answers
  • A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,
    9·1 answer
  • . It has been said that technology will be the end of management. Maybe. How about artificial intelligence
    9·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • Can you guys help me with this coding assignments?
    10·1 answer
  • Types of Hazards Mitigation Measures
    8·2 answers
  • Explain why it is important that the device registration is the last thing that is done in the initialization routine of a devic
    10·1 answer
  • Someone put malware on your computer that records all of your keystrokes. what aspect of security was primarily attacked? choose
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!