1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
12

a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t

he building is causing what type of security breach?(a) Physical(b) Technical(c) Operational(d) Remote access
Computers and Technology
1 answer:
charle [14.2K]3 years ago
6 0

Answer: a)Physical access

Explanation: Physical access is the function that permits the accessing of the  computer system in a physical way. This access work on the building, It organization and other physical buildings.This access make the system prone to high amount of corruption and hacking .

Other options are incorrect because technical access is for the accessing the technical parts,operational access is for controlling the functions and remote access is for accessing the system from remote area.Thus the correct option is option (a).

You might be interested in
What is a graphical representation of a real person in a virtual community called?
Hitman42 [59]
A graphical representation of a real person in a virtual community is an avatar.
8 0
4 years ago
2
Crazy boy [7]

If any mistake was made using this type of primitive programming, the entire program of punch cards had to be re punched again. The correct option is A.

<h3>What is punch card?</h3>

A punch card is a card on which data is able to be recorded in the form of punched holes.

Whenever a mistake is done, the punched card is scrapped and made anew one for same programming.

Thus, if any mistake was made using this type of primitive programming. The entire program of punch cards had to be re punched again. The correct option is A.

Learn more about punch card.

brainly.com/question/27476988

#SPJ1

4 0
2 years ago
Como afecta la robotizacion en las empresas?
kirill [66]

Yo llamaria a esto automatizacion.

Puede reducir los costos al permitir que la empresa emplee a menos personas.

8 0
3 years ago
What is the characteristics of a spear phishing message
Cerrena [4.2K]
It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
7 0
3 years ago
Read 2 more answers
Two types of formulas in Excel, what are they? A. Complex and simple, B. General and currency, C. Logical and Boolean, D. Trig a
lyudmila [28]
A. Complex and simple
4 0
3 years ago
Other questions:
  • This device transmits data to all the workstations on a network. gateway hub router switch
    11·2 answers
  • You are the project manger for Xylophone Phonics. It produces children's software programs that teach basic reading and math ski
    11·1 answer
  • Which of the following are true about the PUSH instruction?
    9·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • How to make all cells the same size in excel?
    15·1 answer
  • Assignment 4: Evens and Odds
    9·1 answer
  • ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
    8·1 answer
  • Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's comput
    15·1 answer
  • NO LINKS Please
    8·2 answers
  • Need this java code its on zybooks. given two integers as user inputs that represent the number of drinks to buy and the number
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!