1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
5

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful.

She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona not include in her presentation?
A. Large number of vulnerabilities.
B. End-of-life systems.
C. Lack of vendor support.
D. Mis-configurations.
Computers and Technology
1 answer:
Mars2501 [29]3 years ago
4 0

Answers:

C. Lack of vendor support.

Explanation:

In formation technology, network administrators and engineers experience network security thread due to a large number of vulnerabilities from poorly configured security protocols and end of life of network devices, which results from the outdated nature of a device leading to the end of continual upgrade of the system to allow current and more secure network configuration protocols.

The lack of vendor support is not discussed because the standard OSI and TCP network model are supported by most network device vendors.

You might be interested in
The process of changing a program’s internal structure without changing the way the program works is ______________.
aev [14]

Explanation: changing the coding and not the way it works.

7 0
3 years ago
write a simple assembly code using 8088 microprocessor instruction set to add two numbers ? please help me if you know :(​
Kay [80]

Answer:

sexxxxx chaaaaat insta id abhilash0351

3 0
3 years ago
SummaryIn this lab, you complete a partially written C++ program that includes a function named multiplyNumbers() that multiplie
Maru [420]

Answer:

Declare the method prototype using:

void multiplyNumbers(int x, int y,int &product);

Call the function using:

multiplyNumbers(num1, num2,product);

Lastly, the method is as follows:

void multiplyNumbers (int x, int y,int &product) {

  product = x * y;

  return; }

Explanation:

Declare the method prototype using

void multiplyNumbers(int x, int y,int &product);

Call the function using

multiplyNumbers(num1, num2,product);

The method is as follows; the & written in front of product implies that product is passed by reference

void multiplyNumbers (int x, int y,int &product) {

This calculate the product

  product = x * y;

This returns nothing

  return; }

<em>See attachment for complete program</em>

Download cpp
5 0
3 years ago
What permission do users have by default regarding printer access and the ability to manage documents?
Gnesinka [82]
<span>You can view documents across all print queues and print devices.

</span>
8 0
3 years ago
Technician A says that high pressure in recycled refrigerant is only caused by air contamination. Technician B says that recycle
hjlf

Answer:

a. A only

Explanation:

When air, is in excess of allowable amounts, it  can cause the system to operate at pressures that are higher than normal. This means that the recycled refrigerant is operating at high pressure. Thus Technician A is correct.

However, Technician B is incorrect because unlike reclaimed refrigerants where the process strip the refrigerant of impurities making it to meet the standards of a new refrigerant, the recycled refrigerant is not as pure as it's contaminants are only reduced.

Therefore, only technician A is correct.

6 0
3 years ago
Other questions:
  • Jason works as an accountant in a department store. He needs to keep a daily record of all the invoices issued by the store. Whi
    5·2 answers
  • Which of the following correctly describes the function of an IP address?
    7·1 answer
  • Which of the following is not considered as part of technology literacy?
    8·1 answer
  • Which of the following is a group of email names and addresses used for mass distribution of a message?
    5·1 answer
  • Which is the biggest known issue specific to satellite Internet connections?
    13·2 answers
  • Drag each tile to the correct box.
    9·1 answer
  • The instructions for a computer program are sometimes referred to as . computer programmers focus on computer programs, but they
    5·2 answers
  • If I wanted to repeat an action such as a heading for a paper, it would be helpful to _____. create a citation create a caption
    9·2 answers
  • In black and white,<br><br> we must be more conscious of image
    11·1 answer
  • Assume the user types in 7 for x and 2 for y. What is output by the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!