1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
10

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful.

She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?A. Large number of vulnerabilitiesB. End-of-life systemsC. Lack of vendor supportD. Misconfigurations
Computers and Technology
1 answer:
Alex777 [14]3 years ago
7 0

Answer:

D. Misconfigurations

Explanation:

There are a large number of network security vulnerability with is a continuously increasing as technology evolves. Examples of the vulnerabilities are DOS attacks, reconnaissance attack, spyware, key logger, Malicious ware attacks etc.

There are good ways of mitigating these attacks, but sometime lack of vendor support of network devices and end of life systms, broadens the attacks.

Alyona would discuss option A - C, but not D (Misconfigurations) because it would only imply the capacity of the network team.

You might be interested in
How do you give people a brianly i am knew as u can tell
muminat

Answer:

I would like to know as well lol if you find out let me know please!

Explanation:

7 0
2 years ago
Read 2 more answers
Which is an advantage the electronic scheduling tools have over paper calenders?​
MA_775_DIABLO [31]

Answer:

The electronic scheduling tool can help you set an alarm as a reminder for different events, grouping them in other of dates, time, location and the concept of occasion if you need to pick anything along.

The paper calendar cannot do all this, just for you to check manually.

Explanation:

Electronic scheduling is fast, accurate and more organized, paper calendar is manual and less convenient to access.

8 0
3 years ago
Rick is linking different pages in his website. Match the value of the attribute to its meaning to enable Rick to choose the mos
lbvjy [14]

Answer:

4

Explanation:

pretty sure it's 4 hope this helps you

6 0
3 years ago
Database queries is an example of
storchak [24]

Answer:

A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.

SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.

Five types of SQL queries are:

1) Data Definition Language (DDL).

used to define and modify the structure of a database.

2) Data Manipulation Language (DML).

used to manipulate (change) the data in the database.

3) Data Control Language(DCL).

used for access control and permission management for users in the database.

4) Transaction Control Language(TCL).

used for maintaining consistency of the database and for the management of transactions made by the DML commands.

5) Data Query Language (DQL).

used for performing queries on the data within schema objects.

8 0
2 years ago
What are the examples of shareware?
Igoryamba

Answer:

An example of shareware a compression program like Stuffit for Macs or Windows. An example of shareware is a budgeting software program that only allows you to use three categories instead of having the ability to create a full budget.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Which player type focuses on level progression?
    13·1 answer
  • Which type of graph or chart measures
    15·2 answers
  • What is gender bias?
    9·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • Similarities between inline css and internal css​
    6·1 answer
  • In Outlook 2016, the Tell Me function can be accessed by
    15·2 answers
  • 2
    5·1 answer
  • Identify a characteristic that is a disadvantage of cloud-based hosting.
    11·1 answer
  • With _____ technology, a web server delivers information to users, who have signed up for the service, instead of waiting for th
    5·1 answer
  • You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from usin
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!