1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
A router has a valid operating system and a configuration file stored in nvram. the configuration file contains an enable secret
Makovka662 [10]
The answer is user EXEC mode. This is for setting, viewing, and testing system processes. In common, the user EXEC commands let you to link to remote devices, modify terminal line settings on a temporary basis, perform basic tests, and list system information. This also used by common system administrators, while the privileged EXEC mode is used by the root administrator. Use the enable and disable instructions to shift between the two levels. Access to the user-level EXEC command line needs a valid password.
8 0
3 years ago
The kitchen in any café is a noisy place. To make sure the orders which you have carefully written down on your notepad make it
Levart [38]

Answer:

file_name = 'orders.txt'

file_obj = open( file_name, 'r' )

lines = file_obj.read()

print(lines.upper(), end = '')

Explanation:

  • Define the name of the file .
  • Use the built-in open function to open the file in read mode .
  • Use the built-in read function to read the file and assign this to lines variable.
  • Finally display the lines by converting them to capital alphabets by using the built-in upper() function.
5 0
3 years ago
Read the following scenario:
Zigmanuir [339]
The answer would be option C "The app company will sue the multimedia artist for breach of contract." The company bought the game therefore it's no longer his and the multimedia artist cannot release the original version because the app is no longer his and he will be sued for breach of contract. Because if the popular company bought the app from the <span>multimedia artist they would have to sign a contract and other paper work to confirm their purchase.

Hope this help!
</span>
7 0
3 years ago
Ming's computer crashed suddenly the other day. Ming kept trying the solution that worked last few times it had crashed, even th
Nesterboy [21]

Answer:

A mental set is the correct answer of this question.

Explanation:

Ming's computer crashed abruptly the next day. Ming has continued to try the workaround the last couple of times it's crashed, though it's clear that it's not going to fix his computer now. The inability of Ming to overcome this issue is most likely due to a collection of mentalities.Because of his mental set he fails to solve the problem.

It means it is directly related to the mind set of the computer system the main objective of mental set in computer to solve the problem is mental set in computer is not crashed then computer system is not working.

3 0
3 years ago
To use an outline for writing a formal business document, what should you
nydimaria [60]

Answer: D. enter each major point from the outline on a separate line

6 0
3 years ago
Other questions:
  • Your friend wants to know about Microsoft Expression Web 4.
    5·1 answer
  • A section-lined area is always completely bounded or outlined by an?
    11·1 answer
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • Which of the following languages does not provide built-in-pattern matching operations (the language, although, has pattern matc
    14·1 answer
  • One of the factors that influence the effectiveness of chemical sanitizer works effectively between 13° C and 49° C​
    10·1 answer
  • Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number ar
    10·1 answer
  • What is the missing line of code?
    7·2 answers
  • What are the services offered by web-based email?​
    12·1 answer
  • Indicate if the statement is true or false False 1. A spreadsheet cannot recalculate after you have changed data in your workshe
    15·1 answer
  • How to get an object from a container in java.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!