1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
4 years ago
12

A junior security analyst is working on a new ticketing system called ITCustomers. Now and is working in a new field within the

tickets dealing with human mistakes as security incidents. A business executive, while traveling, was surfing a gambling site on his laptop at the airport and downloaded a virus that infected the company’s e-mail system. In filling out the ticket, the junior analyst selected "carelessness with laptops" as the human error. Was the junior analyst’s description of the human mistake on the ticket accurate? Why or why not?
Computers and Technology
1 answer:
Reptile [31]4 years ago
8 0

Answer:

Junior analyst's description isn't right.

Explanation:

"carelessness with laptops" isn't the correct description for the mistake or error, and looks like some physical event occurred like laptop computer getting damaged, because of the error, rather than software virus infection.

A more accurate description would be "not being careful enough while surfing the internet and visiting websites".

You might be interested in
What is some effective writing techniques?
scoray [572]
Be persuasive, have form, and know what you are talking about. I would recommend using MELCON.  You can learn more about MELCON with this link.  http://melcon.weebly.com/
3 0
3 years ago
Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers l
tiny-mole [99]

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

6 0
3 years ago
How many levels of full body protective clothing are there? A. Four B. Seven C. Six D. Two
Verdich [7]
The answer is A. Four
4 0
3 years ago
Read 2 more answers
Course Aggregation Many times, departments are only interested with how students have done in courses relative to a specific maj
nadezda [96]

Answer:

def course_grader(student_to_grades, course_prefix):

   student_grades = dict()

   for key, value in student_to_grades.items():

       grade_score = 0

       for course,grade in value.items():  

           if course_prefix == course:  

               grade_score += grade

                student_grades[key] = grade_score / len(value.keys())

   return student_grades

Explanation:

The course_grader function is a python program that accepts two arguments, the student dictionary and the course prefix. The function returns a dictionary of the student id as the key and the average grade of the student as the value.

8 0
3 years ago
Match the term with the appropriate definitions : Edge Computer Applications ANSWERED
WARRIOR [948]
It’s right, good luck.
7 0
2 years ago
Other questions:
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • You can type notes of what to cover when presenting the show in the______ pane.
    15·1 answer
  • The optional feature in a business letter is
    10·1 answer
  • The ability to anticipate and determine upcoming driving hazards and conditions are adversely affected
    14·1 answer
  • What is a screen tip
    6·1 answer
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • Office 365 ProPlus can be deployed to your enterprise. When doing so, which tool enables you to choose the language, hardware ar
    5·1 answer
  • A good machine should have the mechanical advantage of......?​
    7·1 answer
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
  • When viewing an e-book section of an assignment in launchpad, you can return to your main course page at any time by clicking th
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!