1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frosja888 [35]
3 years ago
11

WILL UPVOTE ALL plz

Computers and Technology
1 answer:
OverLord2011 [107]3 years ago
8 0
D-ash is the answer.
You might be interested in
Directory servers from different vendors are synchronized through ________.
andriy [413]
With a little digging I've done, finding this question with different answers the one you want is D. none of the above
6 0
3 years ago
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
Suppose you are currently in the /home/hnewman/os/fall/2013 directory and would like to navigate to /home/hnewman/discreteStruct
Alex Ar [27]

Answer:

C

Explanation:

ive been doing this same one so its C

6 0
3 years ago
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
3 years ago
Read 2 more answers
Juan is a network administrator and must set up a VPN for his company's network. To allow safe communication, he should
Mekhanik [1.2K]

Answer:

select Control Panel, then Network Protocols, then Internet

4 0
3 years ago
Other questions:
  • Which of these is a weakness of written communication?
    8·1 answer
  • Which of these options would likely have a better playback experience in your presentation?
    8·2 answers
  • Which different supports from a part of the matte box?
    8·1 answer
  • Define the following terms:<br><br> - pigment<br> - vehicle<br> - binder<br><br> plz help
    12·2 answers
  • dentify the type of observational study​ (cross-sectional, retrospective, or​ prospective) described below. A research company u
    5·1 answer
  • Why do we allow electronic instruments to warm-up before use?
    11·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • Why was the pilgrim's first corn crop such as successful one??
    7·1 answer
  • 19 dollar fortnite giftcard who wants it
    15·2 answers
  • There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!