1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
3 years ago
8

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in

Computers and Technology
1 answer:
icang [17]3 years ago
8 0

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

You might be interested in
Your company has decided to hire a full-time video editor. You have been asked to find a system with the level of display qualit
mote1985 [20]

Answer:

"Resolution" and "Refresh rate" is the correct answer.

Explanation:

Resolution:

  • The resolution would be a step for describing the spatial brightness as well as cleanliness of something like a photograph but rather an image. It's always commonly being utilized for the performance evaluation of monitoring devices, digital photographs as well as numerous additional technology components.

Refresh rate:

  • A computer display as well as visualization technology feature that determines the equipment frequency as well as capacity for repainting or re-drawing that this whole presentation upon on-screen for every instant.
4 0
2 years ago
Why would a server 2008 r2 dns server have a different security baseline than a windows xp client?
AnnZ [28]
The Answer is <span>If systems perform different functions, security settings can restrict one function but not the other. Also, XP is a desktop OS vs. Server 2008R2 is a Server OS. An XP client can never be a DNS server.

These questions are ambiguous and silly.</span>
3 0
3 years ago
PLEASE HELPPP!!! QBASIC WORK!
GrogVix [38]

Answer:

INPUT "Input Length: ";LENGTH

INPUT "Input Width: ";WIDTH

AREA = WIDTH*LENGTH

IF AREA >= 250 THEN PRINT "Big room"

IF AREA < 250 THEN PRINT "Small room"

Explanation:

4 0
2 years ago
What would be the best thing you could do to prepare yourself to work for a company that has embraced globalization?
Nesterboy [21]

Answer:

C.Study different organizational structures

Explanation:

The best thing you could do to prepare yourself to work for a company that has embraced globalization is to <u>study different organizational structures.</u>

This would help you to gather knowledge about different organizational working structures and figure out planing strategies to deal with each organization accordingly.

It helps in effective and efficient work output.

I hope the answer was helpful.

Thanks for asking.

3 0
3 years ago
9.4 Code Practice:Question 1
Ymorist [56]

Answer:

// Program is written in C++

// Comments are used for explanatory purpose

// Program starts here

#include<iostream>

using namespace std;

int main()

{

// Declare array

/* There are 18 characters between f and w. So, the array is declared as thus;*/

char letters [18];

// Initialise array index to 0

int i = 0;

// Get input

for(char alphs = 'f'; alphs<='w'; alphs++)

{

letters[i] = alphs;

// Increment array elements

i++;

}

// Print Array

cout<<"['";

for(int j = 0; j <18; j++)

{

if(j<17){

cout<<letters[j]<<"', '";

}

else

{

cout<<letters[j]<<"']";

}

}

return 0;

}

Explanation:

The above code declares a char array named letters of length 18. This is so because there are 18 characters from f to w (both inclusive). This is done using the following: char letters [18];

Index of array starts from 0; so, the next line initializes the array letters to 0 and prepares it for input.

The first for-loop statement is used to input characters to letter array. This done by iterating from 'f' to 'w' using variable alphs.

Outside the for loop; the statement cout<<"['"; prints ['

The next for loop prints f','g','h' ........ 'w']

Bring this two prints together, it gives the desired output

['f','g','h' ........ 'w']

4 0
3 years ago
Other questions:
  • ) The ________ displays a text box and button for users to browse, select, and upload a file. (Points : 3)
    13·1 answer
  • True or false? malware problems and other compromises of your computer information are rare.
    15·1 answer
  • What are the steps to create a new folder named C12000 and save it
    13·1 answer
  • Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
    11·1 answer
  • What should you do to organize a large amount of data??
    10·1 answer
  • Who invented the touchscreen? When and which company makes it?
    9·1 answer
  • A DBMS commonly receives data update requests from application programs.A. TrueB. False
    11·1 answer
  • What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a
    6·1 answer
  • No. of
    10·1 answer
  • Can anyone help me out with my photography questions?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!