1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexandr1967 [171]
3 years ago
9

What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?

Computers and Technology
2 answers:
Aleksandr [31]3 years ago
7 0

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

icang [17]3 years ago
5 0

Answer:

Explanation:

This is a network protocol primarily designed for window-based system to share files with other computers on the same network. although with samba, other Operating system such ios can use SMB.

Yes, an Hacker can still damage a network using SMB by attacking the main server.

You might be interested in
What is the difference between cybercrime and cyber security?
Klio2033 [76]

Answer: Cybersecurity is ultimately about protecting government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities. Cybercrime, on the other hand, tends to focus more on protecting individuals and families as they navigate online life.

Explanation:

3 0
3 years ago
Suppose you want to write an if statement with multiple alternatives to print out someone's tax bracket based on their income. A
soldier1979 [14.2K]

Answer:

b) The conditions should use an if else/if else sequence, not just independent if statements

hope it answers the question:)

6 0
3 years ago
BestMed Medical Supplies Corporation sells medical and surgical products
ioda

Management  of the company should adopt a system for unified communications.

<h3>What is unified communications?</h3>

Unified Communications (UC) is a term that connote a kind of a phone system that uses or “unifies” a lot of communication methods within one or the same business.

Note the one's business can be able to communicates in a lot of ways such as  phone calls, video conferencing and as such, Best Med Medical Supplies Corporation  should be considered adopting a system for unified communications.

They should look into:

  • The level of productivity
  • Total costs
  • Compatibility with their business model
  • Productivity.

Learn more about communications from

brainly.com/question/26152499

#SPJ1

3 0
2 years ago
For homework, we were given this photo and to figure out what it is. It is up close and labelled “ too close to tell” but I have
dalvyx [7]
I honestly have no idea on what this is... but im guessing its some sort of tool or food in somebodys mouth... probably isn't but oh well..
7 0
3 years ago
Which of the following is not a type of user account? A. Administrator b. Guest c. Group d. Standard
Arlecino [84]
I've never heard of a group account so I'm going with.
C. Group
5 0
4 years ago
Other questions:
  • PLEASE HELP PROGRAMMING WILL GIVE BRAINLIEST
    7·1 answer
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    12·2 answers
  • PLEASE HELP ME ASAP!!! THIS IS DUE SOON!!
    9·1 answer
  • When you leave your computer for a short period of time, why should you put your computer into Standby mode?
    5·2 answers
  • Debevec mentions using the technology he described to animate entire human bodies. Discuss why you think this is or is not a goo
    13·1 answer
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • What are the best ways to conduct research for a presentation? Check all that apply.
    7·2 answers
  • How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
    6·1 answer
  • The probability of event A occurring is 10/10. The probability of event B occurring is 0/10. What is the entropy of this system?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!