1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
14

An IT specialist is consulted about setting up a peer-to-peer network. What would the specialist say about security risk in this

type of network?
A. There are many separate points of access that pose a security risk.
B. The peer-to-peer network is the most secure network available.
C. Peer-to-peer networks use a central server to provide security measures.
D. Peer-to-peer networks limit outside network access, so there is no security risk.
Computers and Technology
2 answers:
Igoryamba3 years ago
7 0

Answer:

A

Explanation:

ohaa [14]3 years ago
6 0

I just did this, its A

You might be interested in
What kind of energy transformation occurs when you call someone on a cell phone?
andrew11 [14]

The <em><u>sound energy into electric energy and then into radiant energy.</u></em>

<em>[That's it]:)</em>

5 0
2 years ago
why are the ads you might see on tv between 8am and 10am usually not the same ads you would see between 8pm and 10pm?
sdas [7]

Answer:

THEY rotate.

Explanation:

6 0
3 years ago
Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order
cricket20 [7]

Answer:

Select the data to sort

Explanation:

4 0
3 years ago
Which feature of vitualization helps increase the IT productivity of a business?
laila [671]
A the answer is yes
7 0
3 years ago
How many times go you need to click the format painter button to apply copied formats to multiple paragraphs one right after the
Umnica [9.8K]
Double click would be enough
6 0
2 years ago
Read 2 more answers
Other questions:
  • Which is a function of network media?
    11·2 answers
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • The position of a _____ is a nontechnical position responsible for defining and implementing consistent principles for setting d
    15·1 answer
  • Which of the following is most likely to be a result of hacking? Group of answer choices slowing of network speed certain Web si
    13·1 answer
  • Csc105 final graded project
    9·1 answer
  • YOU WANT TO DISCARD YOUR OLD COMPUTER AND WANT TO SECURELY ERASE THE DATA FROM YOUR HARD DRIVE. WHAT SOFTWARE CAN YOU USE AND WH
    9·2 answers
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • Pls help I will give points
    7·1 answer
  • Programming Cycle. Arrange them in correct order​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!