1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
9

What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?

Computers and Technology
2 answers:
Aleksandr [31]3 years ago
7 0

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

icang [17]3 years ago
5 0

Answer:

Explanation:

This is a network protocol primarily designed for window-based system to share files with other computers on the same network. although with samba, other Operating system such ios can use SMB.

Yes, an Hacker can still damage a network using SMB by attacking the main server.

You might be interested in
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
Create a new Die object. (Refer to Die.html for documentation.)Create a loop that will iterate at least 100 times. In the loop b
hjlf

Answer:

Java code is given below

Explanation:

import java.util.Random;

class Die{

private int sides;

public Die(){

sides = 6;

}

public Die(int s){

sides = s;

}

public int Roll(){

Random r = new Random();

return r.nextInt(6)+1;

}

}

class DieRoll{

public static void main(String[] args) {

Die die = new Die();

int arr[] = new int[6];

for(int i=0; i<6; i++)

arr[i] = 0;

for(int i=0; i<100; i++){

int r = die.Roll();

arr[r-1]++;

}

for(int i=0; i<6; i++)

System.out.println((i+1)+" was rolled "+arr[i]+" times.");

}

}

8 0
4 years ago
You should check your battery ___________. Every week Never Every six months Every 30,00 miles
vova2212 [387]

The answer is Every six months

A battery acts as the brain of a car and is used to power almost everything. It can last up to five years. However, this lifespan will depend on how well the battery is maintained and the type of weather conditions you live in. Aim to check your car battery at least twice a year. Actually, it is best to check your battery regularly and not to wait for your mechanic to test your battery during routine servicing.

5 0
3 years ago
Read 2 more answers
A(n) __________ is a popular way to describe relationships? (i.e., one-to-one,? one-to-many) in a relational database.
Leto [7]
A link is a popular way to describe relationships in a relational database.
There are three types of relationships (links) between tables:
1. One-to-one <span>relationship , that allows only one record on each side of the relationship.
2. </span>One-to-many <span>relationship, that allows a single record in one table to be related to multiple records in another table.
3. </span>Many-to-many<span> relationship, in which many records in a table can link to many records in another table. F</span>
6 0
3 years ago
A byte in memory is identified by a unique number called its
Murrr4er [49]
It is identified by its address number.
4 0
4 years ago
Other questions:
  • This toolbar can be used to change the way the text in your presentation looks. Drawing
    5·2 answers
  • Answer these two if u can❤️
    5·2 answers
  • Rint "Censored" if userInput contains the word "darn", else print userInput. End with newline.
    11·1 answer
  • Blind spots are those areas not reflected in your:
    7·2 answers
  • When you make taffy (a pliable candy), you must heat the candy mixture to 270 degrees Fahrenheit.
    8·1 answer
  • Coordinate with
    12·1 answer
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • Most of the Desktop games contain a backdoor used to test and update the game.
    14·1 answer
  • Which bug type would you suggest for the following bug? The button label "Add to cart" is not fully visible.
    5·1 answer
  • I don't get the width and height part (PLEASE HELP WILL GIVE BRAINLIEST ANSWER)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!