1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
11

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st

eal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach
Computers and Technology
1 answer:
natulia [17]3 years ago
8 0

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

You might be interested in
4. What is an example of a Trans receiver? *<br> A. Pager<br> B. Wi-Fi<br> C. Telephone
Charra [1.4K]
I really think it A : pager
I hope this helps !!
8 0
3 years ago
Using more than one array to store related data is called _____________ arrays.
Makovka662 [10]
It is called matrix arrays
6 0
2 years ago
Read 2 more answers
What an underlined word or phrase represents? (HTML AND CSS), has to be 9 letters long. kinda urgent
xz_007 [3.2K]

Answer:

hyperlink

Explanation:

Hyperlinks render as underlined by default, so that's my guess.

7 0
3 years ago
10) What is the BEST way to rewrite sentence (1) to make it more
givi [52]
I believe the answer is D. It makes more sense and is the most correct grammatically.

Hope this helped and pls mark as brainliest!

~ Luna
3 0
3 years ago
Read 2 more answers
Critics are concerned about how easy it is to upload and download music on the Internet because:
evablogger [386]
C. people have to buy entire albums, which can get expensive.
6 0
3 years ago
Read 2 more answers
Other questions:
  • What term refers to a piece of software that interfaces with the hardware on your computer?
    10·2 answers
  • How do you open Microsoft Excel 2013 with Windows 8?
    13·1 answer
  • Peter works on a huge database of numerical figures in a worksheet ranging from cell A1 to cell I50. He has to print the workshe
    15·2 answers
  • Columns are labeled with letters and Rows are labeled with numbers.
    5·1 answer
  • When can you access the BIOS setup utility?
    14·1 answer
  • What framework provides a simple API for performing web tasks?
    13·1 answer
  • What is the working principle of computer?​
    10·1 answer
  • Use the drop-down menus to complete statements about audio file formats.
    10·1 answer
  • Which pair of devices have the same input motion and different outputs?
    15·1 answer
  • List out any four hardware and software components required for multimedia​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!