1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
netineya [11]
3 years ago
5

A user purchased a new smart home device with embedded software and connected the device to a home network. The user then regist

ered the device with the manufacturer, setting up an account using a personal e-mail and password. Which of the following explains how a phishing attack could occur against the user of the smart home device?
A. A vulnerability in the device's software is exploited to gain unauthorized access to other devices on the user's home network.
B. A vulnerability in the device's software is exploited to install software that reveals the user's password to an unauthorized individual
C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm the account password by clicking on a link in the e-mail and entering the password on the resulting page.
D. The user's account is sent an overwhelming number of messages in an attempt to disrupt service on the user's home network.
Computers and Technology
1 answer:
Rzqust [24]3 years ago
7 0

Answer:

C. The user is sent an e-mail appearing to be from the manufacturer, asking the user to confirm account password by clicking on a link in the e-mail and entering password on the resulting page.

Explanation:

Phishing attack is a cyber atttack in which user is sent an email which he thinks is useful. When the user open the email and does as instructed in the email his account gets locked. His personal information is haccked and then rannsom is demanded to release that information. The hacckers usually steal credit card information and bank details of the user which are misused.

You might be interested in
:If a process terminates, will its threads also terminate or will they continue to run? Explain your answer.
Molodets [167]

Answer:

Threads will terminate

Explanation:

Each process are assigned there own memory and resources, Process is also called Application such as Chrome, Word etc. Process can have one or many threads. each thread shares the memory and resources of its process.

Once the process terminates and its free its memory and resources, Which means all of its threads automatically terminated as they share the memory and resources of process.

Thread can only resides within process resources.

5 0
3 years ago
9.4 Code Practice: Your task is to determine whether each item in the array above is divisible
wariber [46]

Answer:

Explanation:

The following Python code is a function that takes in an array as a parameter, it then loops through the array determining if the element is divisible by 3. If it is it leaves it alone, otherwise it changes it to a 0. Then ouputs the array. A test case is shown in the attached image below using a sample array.

def divisible_by_three(array):

   for x in array:

       if x % 3 == 0:

           pass

       else:

           array[array.index(x)] = 0

   return array

7 0
3 years ago
What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.
yulyashka [42]

Answer:

The command to create a compressed archive (archive1.tar.gz) is

tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

Explanation:

The explanation for the above command is

The general command to create a compressed archive is

tar -czvf name-of-archive.tar.gz /path/to/directory-or-files

Here, the terms are as follows:

-c : Creates an archive

-z : Compress the archive with gzip.

-v : This is known as verbose. This is an optional command and it displays the progress on terminal command. Without this the progress is not displayed on terminal command.

-f : Allows to specify the file name of the archive.

Here, if we want to archive multiple files, we provide the command the names of multiple files or directories of the files also can be used.

So, the command tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

creates a compressed archive  - archive1.tar.gz of files test1, test2 and test3.

 

7 0
3 years ago
Which of the following BEST describes a permissive software license?
Olegator [25]

Answer:

B

Explanation:

A permissive software license is a free-software license which carries a minimal restrictions on how the software can be used, modified, and redistributed, usually including a warranty disclaimer.

I hope this helps.

Please rate me brainliest.

8 0
2 years ago
Read the excerpt from Act 111, scene iii of Romeo and Juliet. Which is the best paraphrase of this dialogue
Rufina [12.5K]
I think that D is the answer
8 0
3 years ago
Other questions:
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • A program that coaches you at each step in the process is said to have a(n)
    12·2 answers
  • What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
    8·1 answer
  • Consider this data sequence: "fish bird reptile reptile bird bird bird mammal fish". let's define a singleton to be a data eleme
    5·1 answer
  • In a system using the fixed partitions memory allocation scheme, given the following situation (and using a decimal form): After
    9·1 answer
  • In this challenge, write a function to add two floating point numbers. Determine the integer floor of the sum. The floor is the
    8·1 answer
  • write a c++ program that writes weather data from a file wx_data.txt to a file wx_summary for everyday of the year. also add min
    15·1 answer
  • 8.2 Code Practice Edhesive
    6·1 answer
  • PLEASE HELP
    12·1 answer
  • Please can someone solve this question<br>What is a software and types of software​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!