1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
steposvetlana [31]
3 years ago
10

Which of the following attack is a threat to confidentiality?

Computers and Technology
1 answer:
velikii [3]3 years ago
3 0

Answer:

The correct answer is letter "B": masquerading.

Explanation:

The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -<em>the user has a login and password that does not belong to him to access a server</em>- or personally -<em>employees accessing restricted areas of a company.</em>

You might be interested in
Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report
algol13

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

<h3>Does Apple use the file based encryption?</h3>

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
1 year ago
If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
Ira Lisetskai [31]

Answer:

LAN

Explanation:

A LAN ( local area network) is network that is installed with a small area like a building. It can be connected to a WAN or wide area network. The connection between the devices in a LAN network could be with cable (Ethernet protocol) or wireless using WiFi protocol.

The traditional connection in a LAN is with cable, but sometimes, a wireless connection can be used, this is called a WLAN (wireless local area network). Both form of connections are still under the LAN domain.

6 0
3 years ago
Can someone tell me how to mark people the brainiest on a laptop?
Crazy boy [7]

When two people give answer to your question, then below their answer you will get a option Mark as Brainliest. You simply need to click that button

7 0
2 years ago
List the final state of the cache, with each valid entry represented as a record of &lt; index, tag, data &gt;.
yanalaym [24]
There is not enough information to give correct answer. Anyway, I guess, I've seen this question before and I know the answer. I wrote it in binary. So if your task's details look like this: tag bits 31-10 2; index bits 9-4; offset bits 3:0; your answer is:

<000000, 0001, mem[1024]>
<000001, 0011, mem[3088]>
<001011, 0000, mem[176]>
<001000, 0010, mem[2176]>
<001110, 0000, mem[224]>
<001010, 0000, mem[160]> 
8 0
2 years ago
A computer program or an electronic or other automated means used independently to initiate an action or respond to electronic r
laiz [17]

Answer:

electronic agent

Explanation:

Agents in computing are autonomous systems that initiate actions without human intervention.

8 0
2 years ago
Other questions:
  • True / False<br> Registers are generally optimized for capacity instead of speed.
    14·1 answer
  • Complete each sentence to describe different elements of an Excel worksheet.
    11·2 answers
  • I need help with this plz question 2 and 3 asap
    7·1 answer
  • Intel Centrino Technology is the combinatin of wirelesstechnology with the previous HT technology.
    14·1 answer
  • Who play fortnite gameeeeeeee
    14·1 answer
  • Select the correct answer from each drop-down menu.
    13·1 answer
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    15·1 answer
  • The average numbers of shares a piece of content receives is known as its:
    7·1 answer
  • The act of using computer equipment to “break into” the computer systems of others?
    6·1 answer
  • What are the advantage of an e-library​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!