1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
3 years ago
10

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful.

She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?A. Large number of vulnerabilitiesB. End-of-life systemsC. Lack of vendor supportD. Misconfigurations
Computers and Technology
1 answer:
Alex777 [14]3 years ago
7 0

Answer:

D. Misconfigurations

Explanation:

There are a large number of network security vulnerability with is a continuously increasing as technology evolves. Examples of the vulnerabilities are DOS attacks, reconnaissance attack, spyware, key logger, Malicious ware attacks etc.

There are good ways of mitigating these attacks, but sometime lack of vendor support of network devices and end of life systms, broadens the attacks.

Alyona would discuss option A - C, but not D (Misconfigurations) because it would only imply the capacity of the network team.

You might be interested in
PowerPoint Online automatically saves your presentation to what Office Online application? OneDocument OneDrive OneNote OneWay
-BARSIC- [3]

Answer:

OneDrive

Explanation:

OneDrive is Microsoft cloud storage service. so it makes sense it would save it their :)

6 0
3 years ago
Read 2 more answers
What is the CPU Unit of a computer?
denis-greek [22]

Answer:

The computer's central processing unit (CPU) is the portion of a computer that retrieves and executes instructions. The CPU is essentially the brain of a CAD system. It consists of an arithmetic and logic unit (ALU), a control unit, and various registers.

Explanation:

.

4 0
3 years ago
Read 2 more answers
These are the records and traces an individual leaves behind as they use the internet
Roman55 [17]

Answer:

Option D. Digital footprints

Explanation:

<u>Digital footprint is all the stuff you leave behind as you use the Internet.</u>

4 0
3 years ago
Read 2 more answers
Which of the following is involved in creating technical communication?
Eva8 [605]

Answer:

(D) All of these answers are correct.

Explanation:

Technical communication is the transmission of any specialized information, be it scientific reports, medical procedures, and any other professional information. Technical information are passed for a specific a purpose are factual, precise, concise and clear. An electrical engineer filling out a standardized form, a webmaster revising a company web page, a company secretary writing a letter to a customer and a manager preparing an oral presentation are all conveying technical information.

8 0
3 years ago
A Floppy Disk is an example of:
lisov135 [29]

Answer:

B I think-

Explanation:

Its either Primary or Secondary :) pretty sure its secondary tho

6 0
3 years ago
Other questions:
  • Jane works in the sales department of a service company. She has impressive interpersonal skills and always turns up for work on
    11·2 answers
  • Need Help ASAP!
    14·2 answers
  • What is the resistance of a 1,000-foot length of #6 AWG wire at a temperature of 25 degrees C? A. 0.1593 ohm B. 0.4028 ohm C. 0.
    7·1 answer
  • The destination ip address is 164.109.27.233 subnet mask of 255.255.192.0 network address is
    12·1 answer
  • 1.The small company where you work needs to implement a second server for its accounting system but does not have the funds to p
    15·1 answer
  • When you receive five job offers what does it mean
    9·1 answer
  • Provide the definition for each of the following structures and unions:
    8·1 answer
  • What are the three fundamental principals of mnemonics??
    6·2 answers
  • In half-wave rectification process, Vi=
    8·1 answer
  • If a packet gets "sucked down a black hole" (figuratively speaking) and is not received by its sender, and no message is sent ba
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!