1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
11

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st

eal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach
Computers and Technology
1 answer:
natulia [17]3 years ago
8 0

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

You might be interested in
The ________ is the easy way to insert a new slide between existing slides.
Tema [17]
What is the subject about?
7 0
3 years ago
What is the most common way to perform searches in a search engine?
valina [46]
Using key words is the best way to search things in the search engine. make sure everything is spelled correctly.
5 0
3 years ago
Well I am having trouble and I feel really bad because I helped RandomGuy1 who rubs it in my face that I gave him the wrong answ
yawa3891 [41]
Hey dude don't leave tell a mod bout it they'll fix everything up for you.
8 0
3 years ago
Edhesive assignment 4
Agata [3.3K]

Answer:

nrToCheck = int(input("How many numbers do you need to check? "))

nrEven = 0

nrOdd = 0

for i in range(nrToCheck):

 number = int(input("Enter number: "))

 if (number % 2):

   nrOdd = nrOdd + 1

   print("{} is an odd number".format(number))

 else:

   nrEven = nrEven + 1

   print("{} is an even number".format(number))

print("You entered {} even number(s).".format(nrEven));

print("You entered {} odd number(s).".format(nrOdd));

7 0
3 years ago
Explain the different types of computer software programs. Be specific and use examples.
lorasvet [3.4K]

Answer: well there are many types of software out there and let's use Microsoft for an example there a really protective company so more people would want to buy from Microsoft they have a lot of high-tech computers so and I'm not favoriting Microsoft it's just what I've use Chrome also is really good but you would kind of want to go off like reviews that you see and everything like that because I'm not a big computer tech but that's just what I know

Explanation:

3 0
4 years ago
Other questions:
  • The EPA requires the use of precise forms called ?
    14·1 answer
  • To change the background color of a page, which tab would you use?
    15·2 answers
  • What are examples of some Exotic currencies?
    14·1 answer
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • What is a set of javascript statements that result in an action?
    15·1 answer
  • Which of the following is true of information systems?
    15·1 answer
  • Given that Apache and Internet Information Services (IIS) are the two most popular web application servers for Linux and Microso
    10·1 answer
  • 1) which of the following is not a characteristic of valuable information?
    8·1 answer
  • having your online class there's a lot of hazards and risk you may encounter while using gadget PC or Laptop whar do you usually
    14·1 answer
  • Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!