1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
10

Which of the following attack is a threat to confidentiality?

Computers and Technology
1 answer:
velikii [3]3 years ago
3 0

Answer:

The correct answer is letter "B": masquerading.

Explanation:

The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -<em>the user has a login and password that does not belong to him to access a server</em>- or personally -<em>employees accessing restricted areas of a company.</em>

You might be interested in
What kind of security features does Microsoft Security Analyzer promise?
Margaret [11]

Answer:

  • Microsoft security analyzer easily update the software system and it a free standalone component which basically provide security to many systems. We can easily update pure system once in a week.
  • Basically, it is a free independent segment which provide the security to many other frameworks. It is used to protect various number of windows against weak passwords by using security scanning.
  • It also check errors in the operating system and provide the security to the file system.
  • It is used to determine the state of security and other specific guidance.

8 0
3 years ago
What is the most significant issue that needs to be addressed when ensuring the proper functioning of a computer?
ycow [4]

Answer:

The most significant issue addressed while ensuring the proper functionality of computer is the working of Operating System.

Explanation:

There are many issues faced while making the computer properly functional. Such as, Memory size, processor speed, software installation etc. while operating system not working properly can cause a significant problem. If operating system is not working properly, the user is unable to use the computer.

So, to make sure the functioning of computer, the significant issue that should be needed to address is Operating System Installation.

7 0
3 years ago
"Switches break up _______________ domains and routers break up _____________ domains."
mel-nik [20]

Answer:

Switches break up collision domains and routers break up broadcast domains.

Explanation:

  • Collision domain depicts the part within a network where a collision can happen.
  • Collision occurs when two hosts transmit data packet at the same time within a network. Theses packets collide and the hosts have to resend the data after some time.
  • Too many collisions can result in slow traffic speed and can effect network performance.
  • So switches break up collision domains between the devices on a network and each port in a switch depicts a collision domain. This reduces the chance of packet collisions between the devices or hosts.
  • When data is to be sent to a host, the switch keeps that data frame and waits for availability of the destination host before sending the data frame.
  • Moreover full duplex switch mode there is not chance of collision as the transmitting path on one host is the receiving path on other host.
  • Broadcast domain contains all the hosts that can reach each other at the Data Link layer via broadcast.
  • Routers break up broadcast domains as routers contain separate broadcast domains for each interface.
  • Routers do not forward broadcasts from one broadcast domain to other and drop the packet when they detect a broadcast address.
4 0
3 years ago
You can select slide objects in order to delete them simultaneously by pressing the _____ key as you click each object. select o
HACTEHA [7]
D tab that is the key you would need to use in order to do that
6 0
3 years ago
Read 2 more answers
When conducting research on the internet, what is a starting point for determining how to start the research?
Alex787 [66]
It depends on what you're researching for.
4 0
3 years ago
Other questions:
  • Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. Th
    15·1 answer
  • In this question, you must create a function in C++ using an external editor. When satisfied with your work, you shall attach it
    10·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • What is sun and what does it do?
    12·2 answers
  • 3.3 Code Practice: Question 1
    15·1 answer
  • A local bank has an in-house application which handles sensitive financial data in a private subnet. After the data is processed
    15·1 answer
  • Write a program to generate a square wave with 80% duty cycle on bit P2.7 Microprocessor.​
    7·1 answer
  • Can you be my friend plz
    9·1 answer
  • Write the algorithm for finding the perimeter of a rectangle using English like form step by step
    10·1 answer
  • ¿Qué son las tecnologías modernas?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!