1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
12

Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______

__ by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with ________, which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam ________ uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters. _________ filters examine the content within a message for certain words or phrases commonly used in spam emails. ________ filters review the email header for falsified information, such as spoofed IP addresses. ________ filters block mail that originates from IP addresses of known spammers. ________ filters block or allow mail based on the sender's address. ________ is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. ________ redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue _________ exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A(n) ________ (Hint: Use the acronym) takes up residence on a digital device and seems impossible to disable or remove.
Computers and Technology
1 answer:
lord [1]3 years ago
3 0

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

You might be interested in
Which of the following SQL statements will display all customers who have not recently placed an order? a. SELECT customer# FROM
JulsSmile [24]

Answer:

The correct option is option 4 from the options indicated below:

Explanation:

The options are as given below

1-SELECT customer# FROM customers

UNION

SELECT customer# FROM orders;

2-SELECT customer# FROM orders

MINUS

SELECT customer# FROM customers;

3-SELECT customer# FROM orders

INTERSECT

SELECT customer# FROM customers;

4-SELECT customer# FROM customers

MINUS

SELECT customer# FROM orders;

Option 1 is not correct as it will provide the list of all the customers whether they have placed order or not.

Option 2 is not correct as it will provide the list of customers who have placed order but are not in the customers table. This will return the empty records.

Option 3 is not correct as it will provide the list of customers who have placed the order.

Option 4 is correct as it will provide the list of customers from the CUSTOMERS table which are not in the Orders table. thus the list of customers who have not placed the order yet.

3 0
3 years ago
Which f the following is not a characteristic of igneous rock
Ne4ueva [31]

Answer:

There are no answers but here is how you classify one with these characteristics so if its not on here probably that one hope this helps :)!

Explanation:

Igneous rocks are formed when melted lava or magma cools and crystallizes, and their unique traits are based on this process. They are strong because their mineral grains grow together tightly as they cool, and their minerals are usually black, white, or gray. They have a texture similar to something baked in an oven, like black bread or peanut brittle.  Some of the main minerals in igneous rocks are feldspar, quartz, olivine and mica. The size of the minerals depends on the depth of the magma that formed the rock. Deeper magma cools more slowly and forms larger crystals. Rocks that cool over a few months have microscopic mineral grains and are called extrusive. Rocks that cool over thousands of years have small to medium grains and are called intrusive. Rocks that cool over millions of years have large pebble sized grains and are called plutonic.  Granite and basalt make up the majority of igneous rocks. Basalt is dark and fine-grained with minerals rich in magnesium and iron. It is either extrusive or intrusive and is the primary rock on the ocean floor. Granite is light and coarse-grained and rich in feldspar and quartz. It is plutonic and less dense than basalt. Granite is found nearly everywhere beneath the continents.  The word "igneous" comes from the Latin word "fire" and is related to the melting process that forms these rocks.

3 0
3 years ago
While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
Natasha_Volkova [10]
True because any one can change or fix their voice just by practicing a voice.
3 0
3 years ago
____ is an iterative software development process that focuses on team productivity and delivers software best practices to all
cluponka [151]

Answer:

RUP

Explanation:

RUP or Rational Unified Process is an IBM's software that divides the development process in four phases. It was developed to work throughout the entire software development life cycle, it's adaptive.

I hope you find this information useful and interesting! Good luck!

5 0
3 years ago
Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet.
Oksana_A [137]

Answer:

Your answer is B. It refers to the language used to create and format Web pages.

Explanation:

HTML stands for "Hyper Text Markup Language", which is a specification used on any webpage, ever. It was created by Sir Tim Berners-Lee in late 1991 and was officially released in 1995. This language is actually what is sent to your browser, which then interprets it and allows you to see the pretty pictures of Brainly.com! As of right now, HTML is at it's 5th revision, also known as HTML5, which is another term you'll see around.

Thanks, let me know if this helped!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is something that scientists often seek by using computer models and simulations?
    8·2 answers
  • I will mark brainalist! ​
    5·1 answer
  • Siapa mahapatih brainly.com atau yg disebut Brainly Amerika Serikat ?​
    5·1 answer
  • How can injection attacks be prevented? Check all that apply
    6·2 answers
  • Overview In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for
    7·1 answer
  • ¿Qué son las tecnologías modernas?
    6·1 answer
  • (Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
    8·1 answer
  • If you do not clean your hardware on a regular basis, which of these is most likely to be a problem?
    11·1 answer
  • You find a picture of a famous department store online that would be great to include in a project of yours. What should you do
    7·1 answer
  • Which directory contains the initrd file? in suse linux
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!