1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
13

TRUE/FALSE QUESTIONS: T F 1. An intruder can also be referred to as a hacker or cracker. T F 2. Activists are either individuals

or members of an organized crime group with a goal of financial reward. T F 3. Running a packet sniffer on a workstation to capture usernames and passwords is an example of intrusion. T F 4. Those who hack into computers do so for the thrill of it or for status. T F 5. Intruders typically use steps from a common attack methodology. T F 6. The IDS component responsible for collecting data is the user interface. T F 7. Intrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways that can be quantified.
Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
5 0

Answer:

1. True 2. False 3. True 4. True 5. True 6. False 7. True

Explanation:

1.  A hacker/cracker finds and exploits weakness in order to gain access with a criminal intent, just as an intruder.

2. Activists are people who campaign to bring about a positive political or social change.

3. It is illegal to use a device as a packet sniffer to steal people's usernames and passwords.

4. This quite true, as there is a huge community of hackers where people are highly recognized for hacking.

5. Yes, intruders have a common attack methodology.

6. IDS monitors networks or systems to identify suspicious activities while a user interface is the means the computer and the user interacts. So it's false.

7. instrusion detection involves monitoring networks or systems to identify suspicious activities, so an intruder is detected if their behavior is suspicious when compared to a legitimate user.

You might be interested in
Design and implement a program that reads a series of 10 integers from the user and prints their average. Read each input value
irina [24]

Answer:

Explanation:

The following program was written in Java. It creates a loop that asks the user for numbers. If it can convert it to an integer it accepts it and adds it to the sum variable otherwise it ouputs that it is not a valid number. Once all 10 integers are added it prints the Average of the values entered.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int count = 0;

       int sum = 0;

       while (count != 10) {

           System.out.println("Enter a number: ");

           String answer = in.nextLine();

           try {

               int intAnswer = Integer.parseInt(answer);

               sum += intAnswer;

               count += 1;

           } catch (NumberFormatException e) {

               System.out.println("Not a valid number.");

           }

       }

       int average = sum / count;

       System.out.println("Average: " + average);

   }

}

3 0
3 years ago
Suggest 2 reasons why a system might maintenance after a while
Nesterboy [21]

Answer:

Prevention Against Viruses and Malware.

Speed up Your Computer.

Explanation:

6 0
2 years ago
How was the addition of
lozanna [386]

Answer:

How was the addition of an improvement over early web design? Webpages could finally incorporate tables into the design

6 0
3 years ago
A user wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page.
Sladkaya [172]

A user who wants to print a spreadsheet horizontally on a piece of paper instead of vertically to fit more columns on a single page should check the portrait orientation check box.

<h3 /><h3>What is a Spreadsheet?</h3>

A spreadsheet is basically a term used to describe any computer application that is used to <em>compute, organize, analyse and store data</em> in tabular form.

Spreadsheets applications play a crucial role today as they help to make the work of educators more efficient. The next time you come across data presented in a tabular form, do remember it was likely made possible by a spreadsheet application.

You can learn about spreadsheets here brainly.com/question/26919847

#SPJ1

4 0
2 years ago
Where does cable termination occur in most buildings?
Igoryamba

Answer:

Demarcation point

Explanation:

There is point that is set by engineers for the entrance of the cables to provide different services such as Telephone, internet and other utilities. At this point a device has been installed, in which service provider and end users plugin their cables.

Service providers is responsible for any service degradation till this point. After this point user is responsible for any damage. This point is called Demarcation point .

6 0
3 years ago
Other questions:
  • When inside a closed work environment, its okay to openly talk with co-workers about PII
    6·1 answer
  • Do routers have ip addresses? if so, how many?
    10·1 answer
  • What is an apprenticeship
    7·1 answer
  • What is a step by step procedure written to carry out a task?
    11·1 answer
  • The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
    10·1 answer
  • What subsection of the Internet requires specialized browser to access and is frequently used by cyber criminals and underground
    10·1 answer
  • You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one anothe
    7·1 answer
  • first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.
    5·1 answer
  • Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
    5·1 answer
  • Add a data attribute tricks of type list to each Dog instance and initialize it in __init__ to the empty list. The user does not
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!