1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
15

The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is

technically the same as the __________, only with the added burden of transmitting over an insecure network.
Computers and Technology
2 answers:
Arlecino [84]3 years ago
7 0

Answer: USER Domain

Explanation:

USER domain allows users to access the workstation domain remotely as in the case above(from a lab). The only issue is the network security in the sense of allowing users to transmit from unsecured servers.

kupik [55]3 years ago
5 0

Answer: Remote Login

Explanation:

The sample remote access policy document from the hospital that you reviewed in the lab showed that the Remote Access Domain is technically the same as the REMOTE LOGIN, only with the added burden of transmitting over an insecure network.

You might be interested in
What is added to brining liquid to add flavour​
AleksAgata [21]
Wet brining is a technique for seasoning meat by soaking it in a salt solution before cooking. As a general guideline, soak the meat in a solution containing 1 cup of salt per gallon of water. The salt will remain in the meat after cooking, imparting taste, and the liquid will be boiled away.

mark brainiest if helped.
5 0
2 years ago
Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
Rzqust [24]

Answer: Linked cell

Explanation: I just did a test

7 0
3 years ago
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
How is information sent across the internet binary
Annette [7]

Answer:

Binary information must be encoded in some way before transmission over the Internet. ... Copper wire is used to transmit binary messages using electricity - a voltage on the wire means one state, and no voltage means the other. Fiber-optic cables, on the other hand, use light (on or off) to transmit a binary message.

8 0
2 years ago
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked an
Strike441 [17]

Answer:

Option C is the correct option.

Explanation:

When any email or message is received from the FBI in the user's computer system and the following message is about the user's computer system has been locked and they demand some amount to unlock their data or information.

So, the following scenario is about the ransomware because they ransom money to retrieve their data and information from the system.

5 0
2 years ago
Other questions:
  • What microprocessor was the first to be processable<br> ?
    14·1 answer
  • If you want to place the insertion point in a cell to edit a specific part of its contents, you can
    5·1 answer
  • Which statement is true about the elements of the interface of a presentation program? The status bar appears at the top of the
    14·2 answers
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • In which type of attack do you get malicious code in links from seemingly reliable websites?
    14·1 answer
  • Brian has been working for a few years now and has saved a substantial amount of money. He now wants to invest 50 percent of his
    12·2 answers
  • Assume that passwords are selected from four-character combinations of 26 alphabeticcharacters. Assume that an adversary is able
    11·1 answer
  • Netflix shows to watch?
    11·2 answers
  • I need help fixing this please
    6·2 answers
  • Read the scenario and then answer the question using only the information provided.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!