1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
3 years ago
12

a _____ combines the characteristics of computer viruses, worms, and other malicious codes with vulnerabilities found on public

and private networks.
Computers and Technology
1 answer:
expeople1 [14]3 years ago
8 0

Answer:

The answer is "Blended Threat"

Explanation:

In the given question some information is missing that is the option of the question, which can be described as follows:

a. Firewalls.

b. Mirror disc.  

c. Threat from the backdoor.

d. blended threat.  

It includes bugs malicious content like malware, grubs, and many other scripts. It helps in remembering things when you combine multiple tasks in a processor to help learn, Its combination of stuff is produced, and other choices were false that can be described as follows:

  • In option a, It provides security to malicious, that's why it is wrong.
  • In option b, It is part of storage system, that's why it is incorrect.
  • In option c, It bypasses the normal security system, that's why it is wrong
You might be interested in
What is an example of using the Internet of Things (IoT) to deliver innovative Cloud-based solutions to customers?
masha68 [24]

Answer: wearable technology that provides customers with on-the-spot personalized experiences

Explanation:

The options include:

a. online surveys that gather customer input to improve services in the future

scheduled conferences with brand ambassadors to pitch customers on new offers

b. customers using a PC connected to a local network to search for recommendations.

c. wearable technology that provides customers with on-the-spot personalized experiences.

The Internet of Things simply means objects that are interrelated, and connected through the internet which are able to transfer data without the interventions of human beings over a wireless network.

An example of using the Internet of Things (IoT) to deliver innovative cloud-based solutions to customers is the wearable technology that provides customers with on-the-spot personalized experiences.

4 0
3 years ago
The encapsulating security ______ protocol provides secrecy for the contents of network communications as well as system-to-syst
Goshia [24]

Answer:

payload

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The encapsulating security payload (ESP) protocol is a standard protocol that provides secrecy for the contents (data) transmitted via network communications, as well as system-to-system authentication and data integrity verification so as to prevent unauthorized access.

Basically, the encapsulating security payload (ESP) protocol is a transport layer protocol that provides data confidentiality, integrity and authentication in IPv6 and IPv4 protocols.

5 0
3 years ago
The best way to insert an existing Excel chart into a document is to
nlexa [21]

B. Click the Insert tab and choose chart.

7 0
4 years ago
Read 2 more answers
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
Virty [35]
I think it is Defragment
8 0
4 years ago
Read 2 more answers
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • Which equation gives you the amount of work performed?
    13·1 answer
  • The memory locations listed in a procedure header's parameterList have procedure scope and are removed from the computer's main
    9·1 answer
  • Online retailer Amazon relies heavily on a hierarchy culture to manage its vast and complex shipping processes. ___________ are
    11·1 answer
  • A computer projecter is an example of a(n):<br> Input Device<br> Output Device<br> Storage Device
    12·2 answers
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • Heeeeeeeeeeeeeeeeeeelp plz
    11·1 answer
  • Define ; proprietary software.​
    6·1 answer
  • Which statement best describes one reason why assembly language is easier
    14·1 answer
  • Technological advancements during the industrial age provided Americans with:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!