1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guapka [62]
2 years ago
5

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old fun

ctioning modem installed. Which of the following security concerns need to be identified and mitigated? (Choose two.)
A. Vishing
B. Whaling
C. Spear phishing
D. Pharming
E. War dialing
F. Hoaxing
Computers and Technology
1 answer:
MAXImum [283]2 years ago
6 0

Answer: Spear phishing; Pharming

Explanation:

Based on the information given in the question, the security concerns that need to be identified and mitigated are spear phishing and pharming.

Spear phishing is the fraudulent practice whereby emails are sent from a trusted sender in which people are targeted to give out some confidential information.

Pharming is a cyberattack whereby the traffic of a website is redirected to another fake site. This is typically done when the host file on the computer of the victim has been changed.

You might be interested in
You are part of the team assigned to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results obtained fro
Ad libitum [116K]

There are different kinds of software implementation strategy. The software implementation strategy would you recommend in this situation to allow users fall-back access to the old system as the new one is implemented is parallel start up.

  • Parallel running often called parallel start up strategy for system changeover where a new system slowly takes over the roles of the older system even when both systems operate.

This conversion often occur when the technology of the old system is outdated and as such a new system is needed to be installed to replace the old one.

The parallel running phase is the act of changing a fragment of business information technology operation to a new system.

Learn more about Parallel start up from

brainly.com/question/9343211

7 0
2 years ago
Which of the following are exclusively associated with copyright protection
Virty [35]
U got picture of the question?
5 0
1 year ago
Read 2 more answers
You’re mapping out the logical relations of a database, and you notice that one of your tables will have a pair of child records
Jet001 [13]
The answer to your question is answer A
3 0
2 years ago
Don't Answer If You Are Going To Give Me a Link! DON'T WASTE MY POINTS!
dimulka [17.4K]

Answer:

B but don't be surprised if it is not the answer given.  It's just the best of a bunch of poor choices.

Explanation:

This is actually not an easy question to answer. It's one of those answers that has elements of "Some do and Some don't" in them.

A:  is not true for painters and it is not necessarily true for C for painters.

D: photographer can pose his subjects. A painter can pose someone, but not always.

C: Answered under A.

I think the answer you are forced to choose is B, but neither one has to do it. Still life painters ( a bowl of fruit, a bouquet of flowers) and photographs pose the subjects carefully and do not want the fruit or flowers to move around.

I'd pick B, but it does not have to be the answer. I just think it is less wrong than the others.

5 0
2 years ago
Number of byte required to store illumination
Rina8888 [55]
If we are talking about light that’s an whole different subject
5 0
3 years ago
Other questions:
  • An icon in a document preset that looks like the play button on a YT video, what type of document is the preset meant to be used
    13·2 answers
  • _____ allow(s) a user to double click with the mouse in a document to move the insertion point to a new location.
    11·1 answer
  • An Internet user has a need to send private data to another user. Which of the following provides the most security when transmi
    15·2 answers
  • What is an online recommendation engine?
    12·1 answer
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • Consider the following program where the zu format specifier is used to display as an integer the result of sizeof. #include #in
    11·1 answer
  • How do you calculate the life span of patents?
    13·1 answer
  • Can anybody answer this
    11·1 answer
  • Clarissa is a computer programming consultant. When a client states that they have an extremely complex programming task, which
    10·2 answers
  • 17. Which of the following keyboard shortcut is used to copy the selected text?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!