1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
12

Fill in the blanks:In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human _______

__ by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with ________, which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam ________ uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters. _________ filters examine the content within a message for certain words or phrases commonly used in spam emails. ________ filters review the email header for falsified information, such as spoofed IP addresses. ________ filters block mail that originates from IP addresses of known spammers. ________ filters block or allow mail based on the sender's address. ________ is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. ________ redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue _________ exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A(n) ________ (Hint: Use the acronym) takes up residence on a digital device and seems impossible to disable or remove.
Computers and Technology
1 answer:
lord [1]3 years ago
3 0

Answer:

In the context of cyber security, social engineering (SE) is a deceptive practice that exploits human <u>weaknesses </u>  by inducing victims to interact with a digital device in a way that is not in their best interest. Many of these attacks begin with<u> spam</u> , which is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems. A spam  <u>filter</u> uses a set of rules to examine email messages and determine which are spam. There are four common types of spam filters.<u> Content  </u>filters examine the content within a message for certain words or phrases commonly used in spam emails.<u> Header</u> filters review the email header for falsified information, such as spoofed IP addresses. <u>Blacklist</u> filters block mail that originates from IP addresses of known spammers. <u>Permission </u>                    filters block or allow mail based on the sender's address. <u>Phishing</u> is an email scam that masquerades as a message from a(n) legitimate company or agency of authority, such as the IRS. <u>Pharming</u> redirects Web site traffic to fraudulent Web sites that distribute malware, collect personal data, sell counterfeit products, and perpetrate other scams. A rogue <u>antivirus </u>                exploit usually begins with a virus warning and an offer to disinfect the infected device. Some software is not exactly malware, but it is a nuisance. A <u>PUA </u>takes up residence on a digital device and seems impossible to disable or remove.

You might be interested in
In reference to computer communications, what does the term noise mean?
jeka94
Noise usually means static.
6 0
2 years ago
Read 2 more answers
Pat is listing the parts of a computer. Which is the best option to use when formatting the list?
Zina [86]
If you mean a web page ten the bet option would be elements, where gives you an unordered list and give you an order list
5 0
3 years ago
HELP ASAP DUE IN 10 MINUTES!!! HELP!!!!!<br> Problem solver<br> Logical<br> Innovative
marshall27 [118]
The first one is problem solver, the second one is Innovative, and the third one is logical.
6 0
3 years ago
Read 2 more answers
Write a recursive function to compute sum of first N integers starting with 1.
Citrus2011 [14]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// recursive function to find sum from 1 to n

int recur_Sum(int n)

{ // base condition

if (n <= 1)

 return n;

// recursive call

return n + recur_Sum(n - 1);

}

// main function

int main()

{

   // variables

   int n;

   cout<<"Enter a number:";

   // read the number

   cin>>n;

   // print the sum

   cout<<"Sum of first "<<n<<" integer from 1 to "<<n<<" is:"<<recur_Sum(n);

return 0;

}

Explanation:

Read a number from user and assign it to variable "n".Call function recur_Sum() with parameter "n".This function will recursively call itself and find the Sum of first n numbers from 1 to n.Then function will return the sum.

Output:

Enter a number:10

Sum of first 10 integer from 1 to 10 is:55

4 0
3 years ago
A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops
Irina18 [472]

Answer:

D.

Explanation:

Based on the information provided within the one choice that will least likely impact the programmer's choice in design would be the frequency of a particular item occurring in a data set. This is because the system needs to be handle a large amount of data and be able to scale accordingly, regardless of how many frequent a particular item occurs.

4 0
3 years ago
Other questions:
  • Select the correct answer.
    14·1 answer
  • Using the syntax in section 2.3, write a command delete_all_rights (p, q, s). this command causes p to delete all rights the sub
    13·1 answer
  • Search engines enable you to
    9·2 answers
  • Businesses use a fax cover sheet is to _____. provide detailed service and product information make sure message reaches the rig
    14·2 answers
  • Annie needs to provide a form field that will allow users to select from a predefined list of options but without the ability to
    8·1 answer
  • As it turns out, the scale of this chart is higher than all of these; it’s “exponential.” What does this imply for the difficult
    8·1 answer
  • If you wish to sign out of your Microsoft account, tap or click ____ on the ribbon to open the Backstage view and then tap or cl
    10·1 answer
  • Which factor is NOT used to determine who can be let go during a downsizing?
    8·2 answers
  • Question 1 (1 point)
    9·1 answer
  • Difference between switch and switch lite
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!