1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ganezh [65]
3 years ago
11

Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st

eal data through a VPN connection using the credentials assigned to a vice president in your organization. For security reasons, all individuals in upper management in your organization have unlisted home phone numbers and addresses. However, security camera footage from the vice president's home recorded someone rummaging through her garbage cans prior to the attack. The vice president admitted to writing her VPN login credentials on a sticky note that she subsequently threw away in her household trash. You suspect the attacker found the sticky note in the trash and used the credentials to log in to the network. You've reviewed the vice president's social media pages. You found pictures of her home posted, but you didn't notice anything in the photos that would give away her home address. She assured you that her smart phone was never misplaced prior to the attack. Which security weakness is the most likely cause of the security breach
Computers and Technology
1 answer:
natulia [17]3 years ago
8 0

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

You might be interested in
A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best
nikitadnepr [17]

Answer:

Option D i.e., Individuals; Interactions is the correct option.

Explanation:

Because Agile Manifesto is the development software tool that is used to reads the line for the individuals and it also interacts with the process of the user. It also used to collaborate with their customers to negotiates the contacts of the customers.

Other option is not correct because they are not related to the following statement.

5 0
3 years ago
Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
pentagon [3]

Answer:(d)Scan shows that no scanned port is live on the network

Explanation:

Honeypot shows any attempt of unauthorized access to information in the system. Scan showing not scanned port is live on the network shows the presence of honeypot so that hackers could be trapped to be believed that there are no scanned port.

4 0
3 years ago
PLEASE HELP ME! How should you behave in an online academic environment? Check all that apply. Keep messages brief Respect the c
Colt1911 [192]

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

dont underestimate anyone each person have their own unique skills

Explanation:

4 0
4 years ago
Read 2 more answers
Write an expression that executes the loop body as long as the user enters a non-negative number.
Grace [21]

Answer:

user_num = 9

while user_num > -1:

 print("Body")

 user_num = int(input())

print("Done")

If this answer helped consider rating and marking brainliest :)

7 0
2 years ago
Read 2 more answers
A corporate user is attempting to connect to the company’s Windows domain server on the local network with her new laptop throug
andreev551 [17]

Answer:

B. Windows domain user name and password

Explanation:

Windows domain user name and password are login credentials required for the user to successfully sign in to the Windows domain.

The domain username and password are usually stored on a domain controller rather than on the host.

As a domain user, the computer seeks from the domain controller the privileges assigned to the user, if it gets a positive response from the domain controller, it authorizes the users login credentials without restrictions; else, it denies the user access.

8 0
4 years ago
Other questions:
  • Which signal types are represented by a continuous wave form?
    11·1 answer
  • What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
    5·1 answer
  • How to import any csv from internet in phyton 3 and R ?
    12·1 answer
  • When executing System.out.println(a2), the toString() method in the Object class is invoked. The program cannot be compiled, bec
    11·1 answer
  • State The function<br>of floppy disk​
    10·1 answer
  • A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
    9·1 answer
  • Which operation on a pwc requires more than idle speed?
    8·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
  • Does technology shape society or does society shape technology?
    14·1 answer
  • PYTHON CODING QUESTION
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!