Answer:
a, c, and d.
Explanation:
Let's examine these options:
a -> Spamming can be used to obtain information about the individuals. Those emails can contain links that try to reveal your sensitive information. They can also contain viruses directly like in the some attached folder. Another usage of spamming is just to advertise some products.
c -> Spam emails are not something you requested for. They are just sent to email addresses in huge amounts.
d -> As mentioned earlier, they can be used to obtain personal information like password, credit card information.
Answer:
A, B
Explanation:
Because the desktop computer and the printers are decentralized, they're connected with another noce in a company.. So I suppose that the Risograph and photocopier isn't decentralized.
Answer:
True
Explanation:
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.
Answer: an installation is the act of putting something in, a device that stays in one place, a military base, or an art piece that often involves building and different types of materials.
Explanation:
Getting your new air conditioner put in is an example of an installation.