1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergiy2304 [10]
3 years ago
14

Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames

, passwords, personal information, and social security numbers. Angela and a coworker decide to use the sensitive information to open credit cards in a few of her customer's names. This is a classic example of which of the following security breaches?
A) Social Engineer
B) An insider
C) A spammer
D) A dumpster diver
Computers and Technology
1 answer:
aksik [14]3 years ago
5 0

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

You might be interested in
Which statistical function in a spreadsheet helps you to see how far each number varies, on average, from the average value of t
SpyIntel [72]

RANK.AVG function

This function in Excel helps return the statistical rank of a specific value within a list of numbers. The statistical rank is calculated by arranging the number usually, in a descending way and then assigning a position to each value in a list.

8 0
3 years ago
If a cache access requires one clock cycle and dealing with cache misses requires an additional five clock cycles, which of the
DedPeter [7]

Answer:

B. 80%

Explanation:

To assertain:

1 hit takes 1 clock cycle while 1 miss takes 6 clock cycles

Assuming that:

  1. we have 100 accesses in total,
  2. p are hits,
  3. 100 - p are misses

So, p + (100 - p)*6 = 200\\ \\p+600-6p = 200\\\\-5p + 600 = 200\\\\5p = 600 -200\\\\p = \frac{400}{5} \\\\p= 80

Hence, option B. 80% will result in an effective access time of 2 clock cycles.

5 0
3 years ago
What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible
meriva

Answer:

Move the duplicated code outside of the if statement

5 0
3 years ago
Which port must be open on your router to allow you to upload device configuration and firmware updates using trivial file trans
Vika [28.1K]

Answer:

UDP Port 69

<em>Trivial file transfer protocol (TFTP) operates over UDP port 69.</em>

Explanation:

UDP port 69 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 69 makes possible the transmission of a datagram message from one computer to an application running in another computer. UDP is used with <em>IP (the Internet Protocol)</em> and UDP Port 69 is <em>connectionless </em>which means it does not give reliable communication; it’s up to the application that received the message on Port 69 to process any errors and verify correct delivery.

3 0
3 years ago
Carbon copy others who are..
My name is Ann [436]

Answer:

Is it Multiple Choice Question?

5 0
3 years ago
Read 2 more answers
Other questions:
  • NEED HELP(10 POINTS) PLEASE HELP MATH
    8·2 answers
  • A defensive driver's priority is __<br> A. efficiency<br> B. speed<br> C. handling<br> D. safety
    9·2 answers
  • Guys i really need help pleasure?
    7·2 answers
  • What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b
    13·1 answer
  • Which search engine do you prefer? Why
    15·2 answers
  • When you touch a hot stove, along which pathway will the impulses travel and what is the final destination in the cns?
    12·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • A single-user/single-tasking operating system allows only one user to perform one task at a time. A real-time operating system g
    13·1 answer
  • The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new
    8·1 answer
  • Please help with this coding question
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!