1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
11

A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints v

ia email for wrong orders and inappropriate images on the website. The Chief Information Officer (CIO) is now worried about the distribution of malware. The company should prepare for which of the following other issues or concerns?
A. Domain reputation
B. Domain hijacking Confirm
C. URL redirections
D. DNS poisoning
Computers and Technology
1 answer:
Reptile [31]3 years ago
6 0

Answer:

Option A (Domain reputation) and Option C (URL redirections) is the correct answer.

Explanation:

<u>Domain reputation</u>:

  • Receipts examine how almost every communication uses one's domain as well as how the communication or transaction will finish up throughout the box.

<u>URL redirections</u>:

  • A component of webhosting that transfers a consumer across one towards the very next URL. Redirects are usually typically self-directed redirect which always utilizes several of the hypertext protocol's set Site Observations.

Other options are not related to the given scenario. So the above two are the correct ones.

You might be interested in
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
Meghan signs into zoom to attend a video call for her online class. what kind of cloud service is she using?
Doss [256]

Meghan signs into zoom to attend a video call for her online class. She is using a SaaS cloud service.

What is cloud service?

A variety of services that are provided to businesses and customers on demand over the internet are referred to as "cloud services." With no internal infrastructure or hardware required, these services are intended to offer quick, economical access to resources and applications.

What is the main purpose of cloud services?

Access to computing resources and IT services should be simple and scalable, whether the cloud is private or public. The hardware and software elements necessary for the efficient use of a cloud computing architecture are included in cloud infrastructure.

What is a SaaS cloud service?

Using the software as a service (SaaS) paradigm, a cloud provider hosts programs and makes them accessible to customers online. The program will be hosted by a third-party cloud provider under this arrangement, which an independent software vendor (ISV) may agree to. Or the cloud provider may double as the software vendor for major organizations like Microsoft.

Learn more about cloud service: brainly.com/question/11014710

#SPJ4

5 0
1 year ago
A measure of the twisting or rotational force that an engine can produce is called
Snowcat [4.5K]
The correct answer is torque.

Torque
A twisting force that tends to cause rotation, commonly used term among mechanics and engineers.
7 0
3 years ago
QUESTION 4
Kaylis [27]

Answer: 2, 3, 6, 8

Explanation:

i must tell you something very important.

in LISTS.... the FIRST thing is marked with a 0.

[0, 1, 1, 2, 3, 6, 8, 13, 21, 34]

[0, 1, 2, 3, 4, 5, 6, 7, 8, 9]

do you see how these line up with each other?

the output would be 2, 3, 6, 8

4 0
3 years ago
You are in charge of recycling computers. some of the computers have hard drives that contain personally identifiable informatio
Gemiola [76]
Wiped and reformatted.
8 0
3 years ago
Other questions:
  • How to type in color on clash royale
    15·2 answers
  • What does SMTP stand for?
    6·2 answers
  • The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a dif
    9·1 answer
  • Which network component connects a device with the transmission media?
    9·1 answer
  • Explain how you would insert graphics using your word-processing software.
    14·1 answer
  • Assume that two arrays are parallel. Assume the first array contains a person's id number and the second contains his or her age
    5·1 answer
  • You are seeking a way to store computer files so you have backup copies anywhere you go.? Which one of the secondary storage typ
    11·1 answer
  • A look to different section of the same page is known as_____.
    7·1 answer
  • A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca
    15·1 answer
  • What is a presentation program? Name any<br> presentation programs.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!