1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
11

A External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints v

ia email for wrong orders and inappropriate images on the website. The Chief Information Officer (CIO) is now worried about the distribution of malware. The company should prepare for which of the following other issues or concerns?
A. Domain reputation
B. Domain hijacking Confirm
C. URL redirections
D. DNS poisoning
Computers and Technology
1 answer:
Reptile [31]3 years ago
6 0

Answer:

Option A (Domain reputation) and Option C (URL redirections) is the correct answer.

Explanation:

<u>Domain reputation</u>:

  • Receipts examine how almost every communication uses one's domain as well as how the communication or transaction will finish up throughout the box.

<u>URL redirections</u>:

  • A component of webhosting that transfers a consumer across one towards the very next URL. Redirects are usually typically self-directed redirect which always utilizes several of the hypertext protocol's set Site Observations.

Other options are not related to the given scenario. So the above two are the correct ones.

You might be interested in
What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
GrogVix [38]

Answer:

PAP authentication method

Explanation:

PAP known as Pass word authentication protocol Basically, PAP works like a standard login procedure; the remote system authenticates itself to the using a static user name and password combination, so not recommended for applications.

6 0
3 years ago
Microsoft is interested in customers' perceptions of Windows 8, its new PC operating system. Since the research goal is rather s
Fantom [35]

Answer:

The answer is "Option c"

Explanation:

An Online questionnaire is a research study, that can be conducted across the internet by the targeted audience. It is the primary use for web-based ways to store feedback, and analyses by statistical apps and other choices were wrong, which can be described as follows:

  • In option a, It is wrong because experimental is used in factor manipulation.
  • In option b, It is not a secondary part of survey, that's why it is incorrect.
  • Option d and Options e is used to in survey, but it's not correct.  

5 0
3 years ago
bookmark question for later what database did zach choose? microsoft excel microsoft access db2 oracle
Veronika [31]

Zach chooses the databases is Oracle

<h3>Explain about the databases?</h3>

Information that is organized into a database is made available for quick administration, updating, and access. Network databases, object-oriented databases, and hierarchical databases are all types of databases.

According to the TOPDB Top Database index, Oracle is the most widely used database with 32.09% of the market share. Computer databases often hold collections of data records or files containing information, such as sales transactions, customer data, financials, and product information My SQL, with a score of 16.64, is in second place, while SQL Server, with a score of 13.72 percent, is third. Since at least 2006, Oracle has dominated global database searches, making it the most used database not just in 2022.

To learn more about databases refer to:

brainly.com/question/28255661

#SPJ4

5 0
1 year ago
Witch of the folowing functions does a browser preform
Elodia [21]
<span>it gives you the ability to perform many tasks for example search something or save your favorites.</span>
5 0
3 years ago
_____ are used to associate a style sheet or style rule with a specific device or list of device features.â
Usimov [2.4K]
Media queries are used to associate a style sheet or style rule with a specific device or list of device features<span> .This technique is used for delivering a tailored style sheet to different devices and applying </span><span>CSS styles depending on a device's general type, specific characteristics  or environment.
</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • ________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
    15·1 answer
  • Which of the following is a beneficial reason to extract mineral resources from the earth?
    13·2 answers
  • Create pseudocode that could be used as a blueprint for a program that would do the following: An employer wants you to create a
    12·1 answer
  • Decision making at the executive or strategic level requires business intelligence and knowledge to support the uncertainty and
    12·1 answer
  • Wi-fi works by converting data signals into which of the following?
    8·2 answers
  • Which two pieces of information must be provided when saving a file for the first time in Wordpad?____.
    8·1 answer
  • Which of the following scenarios describes an advantage of a global economy?
    9·1 answer
  • ______ provide visual representations of the options available for a given command
    7·1 answer
  • Hurry please I’ll give Brainliest if you are right
    5·1 answer
  • As a network architecture, you are tasked with designing a network for a six-story
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!