1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
8

Leah’s computer is connected to the network most of the time. Once, she noticed few of her files with sensitive data were missin

g. Later, she found that an attacker had impersonated her and accessed her computer remotely. On which hardware vulnerability did the attack occur?
The attacker attacked a vulnerability in the BLANK
connected to the client.
Computers and Technology
1 answer:
vivado [14]3 years ago
3 0

Answer:

The Firewall (Router) is the vulnerable hardware.

Explanation:

The entry into the network will be the firewall (If there is a firewall installed on the network), if this medium is compromised, every workstation on the network will be vulnerable.

You might be interested in
One of the most common uses of spreadsheet are
otez555 [7]

I think it is Index Match?

6 0
3 years ago
The Technology Librarian asks you to find out how many hops it takes to get to the first Wi-Fi kiosk. What Windows command can y
V125BC [204]

Answer:

The number of routers arrived in the path of a packet from sender to receiver are called hops. It is term used usually in computer networking.

<u>Command Used to find Hops</u>

In windows command prompt is used to find the number of hops.

1. In Command Prompt type "<em>tracert</em>" after host name and IP address of destination.

<u>Hardware devices Represented by Hop</u>

The main devices that is counted as hop in networking is <em>Router</em>. Nut Sometimes many devices such as <em>switches, repeaters and access points</em> are also count as hops. It depends on the configuration and role of the devices.

8 0
3 years ago
cout &lt;&lt; "Part 1" &lt;&lt; endl; // Part 1 // Enter the statement to print the numbers in index 4 and index 9 // put a spac
Margarita [4]

Answer and Explanation:

#include <iostream>

using namespace std;

int printEven(int array[],int n)

{

int count=0;

for(int i=0;i<n;i++)

{

if(array[i]%2==0)

{

count++;

cout<<array[i]<<" ";

}

}

return count;

}

void printAll(int array[],int n)

{

for(int i=0;i<n;i++)

{

cout<<array[i]<<" ";

}

}

int computeTotalOdds(int array[],int n)

{

int count=0;

for(int i=0;i<n;i++)

{

if(array[i]%2!=0)

{

count++;

 

}

}

return count;

}

int main()

{

int array1[20] = {3, 18, 1, 25, 4, 7, 30, 9, 80, 16, 17};

int numElements = 11;

cout << "Part 1" << endl;

cout<<array1[4]<<" "<<array1[9];

cout << endl;

cout<<array1[0]<<" "<<array1[8];

cout << endl;

array1[2]=12;

cout << "\nPart 2" << endl;

printAll(array1,numElements);

 

cout << "\nPart 3" << endl;

int evens;

evens=printEven(array1,numElements);

 

 

 

 

// This will print the number of evens in the array.

cout << endl << evens;

 

cout << "\nPart 4" << endl;

 

int total;

 

total=computeTotalOdds(array1,numElements);

cout << endl << total;

 

return 0;

}

3 0
3 years ago
The operating cost of driving include
blagie [28]
And what is the question?
4 0
3 years ago
Which of the following factors wouldn't change an account's optimization score?
MatroZZZ [7]

Answer:

Renaming Campaigns

Explanation:

Based on the information provided within the question it can be said that the factor that wouldn't change this would be Renaming Campaigns. This is because an account's optimization score is an estimate of how well the account/campaign will perform in the near future. Changing the name will not change this score since the campaign is still following the same strategy and therefore the estimates will be the same.

8 0
3 years ago
Other questions:
  • Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than
    7·1 answer
  • There are a few simple rules that you can follow to store and manage files and folders in your computer. What is the most import
    9·2 answers
  • How many bits are used to direct traffic to specific services running on a networked computer?
    6·1 answer
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • You are a domain administrator for a large domain. Recently, you have been asked to make changes to some of the permissions rela
    11·1 answer
  • What is the binary system?
    13·2 answers
  • Which of the following activities does an effective team do?
    15·2 answers
  • Ramjac Company wants to set up k independent file servers, each capable of running the company's intranet. Each server has avera
    9·1 answer
  • what impact of information communication technology have on the environment about electronic waste, use of electricity?​
    9·1 answer
  • Which file type is the best choice if the image will be made into a billboard?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!