1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
11

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st

eal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach
Computers and Technology
1 answer:
natulia [17]3 years ago
8 0

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

You might be interested in
Marisol manages the online advertising campaigns for a chain of toy stores with both a physical and an online presence. Which Go
tatiyna

Answer:

Marisol must make use of the Shopping campaign for showing the image of her products, as well as advertise her company's online as well as the local inventory of the toys, as well as boost the traffic to their site and the local toy stores. These types of ads are displayed on Google Shopping which comes just after the search results and near the responsive and text ads.

Explanation:

Please check the answer section.

8 0
3 years ago
A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
insens350 [35]

Answer:

backdoor or trapdoor

Explanation:

A backdoor is also known as a trapdoor or manhole and is known to be a secret means of bypassing security in order to gain access to a system or a restricted part of a system. Some virus contains payload that installs a backdoor component in a system. This backdoor, thus grants the attacker special privilege access to the system at anytime.

6 0
3 years ago
Read 2 more answers
Describe safe motherhood​
Katena32 [7]

Taking good care of your child such as feeding them,hugging them,allowing the child to learn,and many others

3 0
3 years ago
Read 2 more answers
A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
e-lub [12.9K]

Answer:

Option (C) is the correct option.

Explanation:

When the printer printing the documents in a distorted way then, the following workstation installed the wrong drivers for the printer. The computer operator or the technician installs the right driver in the computer system or the workstation. That's why the following issues are generating at the time of printing the documents.

4 0
3 years ago
By definition, what is the process of reducing security exposure and tightening security controls?
saw5 [17]

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

7 0
2 years ago
Other questions:
  • Why it’s important to keep the standard internet protocol TCP/IP?
    11·1 answer
  • What do you call an unsolicited email message that masquerades as coming from a legitimate sender, and attempts to get you to di
    11·1 answer
  • Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician
    10·1 answer
  • After a suspected identity fraud case has been resolved, you should:
    10·2 answers
  • Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4
    15·1 answer
  • American company Software Unlimited is planning to expand its operations to the Bangor Republic where the group is the primary u
    7·1 answer
  • Examine the following code.
    9·1 answer
  • Convert the decimal integer, 353.87510 to each of these forms:
    9·1 answer
  • Cómo fue posible que los alemanes exterminando seres humanos​
    11·1 answer
  • State 4 basic operation performed by a computer​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!