1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alisiya [41]
3 years ago
14

When is it most appropriate to send an automatic reply? Check all that apply.

Computers and Technology
1 answer:
konstantin123 [22]3 years ago
5 0

Answer:

2, 4, 5, 6 are correct

Explanation:

1 and 3 are wrong on edg

You might be interested in
The count formula will tell you how many cells have a number in them, NOT the total number of cells with any value in them. True
Talja [164]

Answer:

false

Explanation:

hope it helps :)

4 0
3 years ago
After reviewing device security you learn that a malicious user in an airport
NARA [144]

Answer:

Sniffing.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.

Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.

A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.

Basically, an unauthorized packet sniffer is used to steal user informations.

This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.

In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.

4 0
3 years ago
I made a fish emoji what do you think >{'_'}< should I change anything
Anvisha [2.4K]

Answer: It is beautiful

Explanation:

3 0
3 years ago
Read 2 more answers
What is the name of a wireless network that allows phones and laptops to connect with pda's using bluetooth communications?
Jlenok [28]
Wireless Personal Area Netwrok (WPAN) or Personal Area Network (PAN)
4 0
3 years ago
How might you use PowerPoint as a student, as an employee, or personally?
katen-ka-za [31]

Answer: You can use a powerpoint as student for assignments, as an employee for presentations, and personally for taking notes.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • A report formatted where the page is taller than it is wide is formatted in ____.
    12·1 answer
  • Which of the following was not important in the development of the internet?
    10·2 answers
  • Why did scientists who study weather need more advanced technology? Check all that apply.
    14·2 answers
  • The correct ordering of the seven layers from "top" to "bottom" is
    11·1 answer
  • A user has a network device that streams media to the LAN. The device is visible on the network. All PCs on the LAN can ping the
    13·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • What is the primary responsibility of the physical layer in data communication?
    8·1 answer
  • Choose the correct term to complete the sentence.
    10·1 answer
  • Consider the following code:
    7·1 answer
  • What would the range(3, 9) function generate?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!