1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
3 years ago
12

Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I

really need correct answer ASAP
What kinds of people do you think are susceptible to being duped by "phishing" attacks?
Computers and Technology
1 answer:
timurjin [86]3 years ago
6 0

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

You might be interested in
Your company has just opened an office in another state and you need the computers to communicate between the offices. What type
galina1969 [7]

Answer:

WAN network

Explanation:

A WAN network is an abbreviation for wide area network. This telecommunication network is mainly used for networking computers. They are not tied to just one location. They can also be called network of networks. It connects several LANs. The lans stand for local area and networks and they are computer networks and devices that are connected to each other within a geographical area.

8 0
3 years ago
Describe how sharing and collaborating a spreadsheet can help the author of the spreadsheet.
Reika [66]
It can help ensure that everything is correct. Having an extra set of eyes can never hurt :)
3 0
3 years ago
Marijuana and hashish come from the hemp plant?
raketka [301]
Yes they come from the hemp plant
5 0
4 years ago
Describe the third generation of computers​
djverab [1.8K]

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.

The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.

Third Generation

The main features of third generation are −

IC used

More reliable in comparison to previous two generations

Smaller size

Generated less heat

Faster

Lesser maintenance

Costly

AC required

Consumed lesser electricity

Supported high-level language

Some computers of this generation were −

IBM-360 series

Honeywell-6000 series

PDP (Personal Data Processor)

IBM-370/168

TDC-316

3 0
3 years ago
Write a complete program that: 1. Prompt the user to enter 10 numbers. 2. save those numbers in a 32-bit integer array. 3. Print
FrozenT [24]

Answer:

see explaination

Explanation:

oid changeCase (char char_array[], int array_size ) {

__asm{

// BEGIN YOUR CODE HERE

mov eax, char_array; //eax is base image

mov edi, 0;

readArray:

cmp edi, array_size;

jge exit;

mov ebx, edi; //using ebx as offset

shl ebx, 2;

mov cl, [eax + ebx]; //using ecx to be the storage register

check:

//working on it

cmp cl, 0x41; //check if cl is <= than ASCII value 65 (A)

jl next_indx;

cmp cl, 0x7A; //check if cl is >= than ASCII value 122 (z)

jg next_indx;

cmp cl, 'a';

jl convert_down;

jge convert_up;

convert_down:

or cl, 0x20; //make it lowercase

jmp write;

convert_up:

and cl, 0x20; //make it uppercase

jmp write;

write:

mov byte ptr [eax + ebx], cl //slight funky town issue here,

next_indx:

inc edi;

exit:

cmp edi, array_size;

jl readArray;

mov char_array, eax;

// END YOUR CODE HERE

}

}

7 0
3 years ago
Other questions:
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    10·1 answer
  • Define a function below called increase_elements_by_x, which takes two arguments - a list of numbers and a single positive numbe
    13·1 answer
  • Which file type is used for animated images?
    9·1 answer
  • Shawn thought that the screen of the block-based program he was using was
    15·1 answer
  • Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by au
    8·1 answer
  • Animations and transitions are added from the _____.
    11·2 answers
  • Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the cont
    11·1 answer
  • 20 points!!
    7·1 answer
  • Describing the One-to-Many Relationship
    13·2 answers
  • Select all that apply.<br> What two things can you do to display the entire contents of a cell?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!