1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
13

Spamming is often possible because hackers are able to locate and take advantage of which of the following:a. Open relay agent.b

. Un-protected systems.c. Protected but open relay agent.d. None of these
Computers and Technology
1 answer:
DochEvi [55]3 years ago
5 0

Answer:

a. Open relay agent.

Explanation:

Open relay agent is a protocol of internet configured in such a way that it allows anyone could send emails, this was the initial configuration on the internet. But this protocol is unpopular because of the spammers used for sending a lot of spam.

After a lot of abuse by spammers, operating an open relay came to be frowned upon among the majority of Internet server administrators users.

You might be interested in
A web directory is a web page that conducts searches of the web to find the words or expressions that you enter? true or false.
Sav [38]
The answer to this is true! hope i helped!
4 0
3 years ago
Next, Adnan decides to recreate the structure on the
Lena [83]

Answer:

a square and a rectangle

Explanation:

8 0
4 years ago
Read 2 more answers
Barat explains that if you have a cell that is the sales price of a given product, the value of which will change to produce the
Mice21 [21]

Answer Choices:

a.goal cell

b.constraint

c.changing cell

d.absolute cell

Answer:

c.changing cell

4 0
4 years ago
Mha ship what yo fave
Diano4ka-milaya [45]

Answer:

umm the first one I think..? lol

4 0
3 years ago
Read 2 more answers
Use the table on the right to convert from hexadecimal to binary.
OLga [1]

Answer:

what is the question and answers?

6 0
3 years ago
Read 2 more answers
Other questions:
  • c++ design a class named myinteger which models integers. interesting properties of the value can be determined. include these m
    14·1 answer
  • In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator t
    14·1 answer
  • Jeremy is typing a term paper on his computer and saves it every five minutes or so for good measure. which of the following bes
    11·1 answer
  • What activities are the most likely to infect your computer with a virus? Check all that apply
    11·2 answers
  • In windows xp, which control panel icon should you choose if you would like to customize your system for left-handed use?
    7·2 answers
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • Which is the most common way to install memory in a laptop?
    14·1 answer
  • Which feature is used to change how a presentation moves from slide to slide?
    14·1 answer
  • Bryan's company is new and has limited funds to work with. He has been tasked with finding a telecommunications technology that
    7·1 answer
  • What are some of the general components of an IDE?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!