1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marysya12 [62]
3 years ago
9

what security threats do you face in your everyday computer usage? list the current security you use on your digital devices wha

t sort of security threats specifically target networks? after reading chapter 5, how will you increase your security?
Computers and Technology
1 answer:
gulaghasi [49]3 years ago
5 0

Answer:

1. The basic threat is junk mails which contains malicious links. There can also be malicious applications on the web which when downloaded can also cause the download of malware. Zero day threats are also being used by hackers to target an OS for a single day.

2. Anti virus software such as MACFREE

3.Threats such as Computer virus, computer worms, Trojan horse, Phishing, Spyware, Rootkit etc. will targets network.

4. I will increase security by:

a) Installing a firewall

b) Updating all the applications and OS

c) Verifying applications before downloading

d) Boost access control by providing strong passwords

Explanation:

You might be interested in
1.
Alecsey [184]
I think
The start and end shape
7 0
3 years ago
When does the following while-loop stop running?
8090 [49]

The loop never stops running because the value of var is always 1.

5 0
3 years ago
Suppose the following sequence of bits arrives over a link:
Lera25 [3.4K]

Answer:

ok

Explanation:

4 0
3 years ago
Which command is used to encrypt all passwords in a router configuration file?
Veseljchak [2.6K]

Answer:

Service Password encryption

Explanation:

It is noted that the command used on routers, to get the data of all the passwords in a router configuration file encrypted is the service password encryption.

Service password encryption solely affects plain text passwords types that includes that of the line passwords or that of the enable password. The feature uses a simple substitution method to create a "secure" non-text password displayed in the configuration.

8 0
3 years ago
Microsoft edge A. Is a newer version of internet explorer B. Works well with safari C. Was designed for apple products D. Is a s
Natali5045456 [20]

Answer: A

Microsoft Edge is a replacement of IE, which is exclusively for Windows 10. Originally named Trident when in development, it was changed to Edge.

It is not for mac, so cross off b and c.

D is definitely wrong, so cross it off.

6 0
4 years ago
Read 2 more answers
Other questions:
  • Mobile providers can be susceptible to poor coverage indoors as a result of: a high degree of latency. network congestion that c
    8·1 answer
  • Write down the complete procedure for creating ExcelSheet.
    8·1 answer
  • Which are valid double statements for java? double a = 0; double b = -1.0; double c = -425; double d = 6340; double e = -1.0; do
    12·2 answers
  • What is a pin? part of a connector a port part of a cable a NIC
    14·1 answer
  • Why are some studs and bolts undercut in the middle?
    11·1 answer
  • How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = fu
    12·1 answer
  • Describe the facility that allows multiple types of operating systems to run in a virtualized environment with varying types of
    15·1 answer
  • Sandra has composed a draft of her essay in Microsoft Word. She now wants to revise the essay. Which tool can she use to store t
    9·1 answer
  • Tools used to type text on Ms -paint​
    10·1 answer
  • When you run your Windows Form application, what is the lifespan of a global variable (also known as a "field" or "class" variab
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!