1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitrij [34]
3 years ago
10

Should the security researcher have published exploit code that affects every version of Windows and cannot be patched

Computers and Technology
1 answer:
grandymaker [24]3 years ago
8 0

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

You might be interested in
What is the term for unsolicited Email​
tiny-mole [99]
Spam - unnecessary or unprecedented emails
3 0
3 years ago
which quotation from the story of the fisherman in the Arabian nights' entertainments supports the theme that cleverness trumps
Greeley [361]

Answer:

Vexed with having such a bad haul, when he had mended his nets, which the carcass of the butt had broken in several places, he threw them a second time

Explanation:

SORRY IF WRONG JUST TRYING TO GET BRAINLIEST TO LEVEL UP

6 0
4 years ago
Which of the following is the safest authentication method?
myrzilka [38]

The safest authentication method is authentication using a smart card.

Smart Card Authentication uses a physical card along with a smart card reader and software on the workstation to validate users into enterprise resources like workstations and applications. Although smart card authentication offers a terrible user experience and is expensive to deploy and maintain, it is very secure.

Because smart card authentication requires a physical credential, a hardware card reader, and software, it is expensive and difficult to administer. Smart cards are only used in the most secure workplaces, such as three-letter agencies of the federal government or privileged access at a financial institution, as these environments frequently forbid employees from carrying smartphones to and from work.

To learn more about Authentication click here:

brainly.com/question/17217803

#SPJ4

6 0
2 years ago
Select three nonrenewable types of energy.
trapecia [35]

Answer:

nuclear, coal,petroleum

6 0
3 years ago
Which command is used to combine two or more cells together into one cell?
Tju [1.3M]
B is your answer I believe
5 0
3 years ago
Read 2 more answers
Other questions:
  • Windows on the desktop are just one of many objects used in a graphical user interface (GUI)-- buttons, drop-down list boxes, po
    7·1 answer
  • Software that controls a computer. an os controls how system resources are used and provides a user interface, a way of managing
    13·1 answer
  • Which of the following STEM discoverers developed a new type of computer hardware?
    11·1 answer
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • What happens when you submit the following code?a.Because the OUTPUT statement does not specifya data set, both output data sets
    6·1 answer
  • Easy coding question, please help.
    13·1 answer
  • ____ can be used to break continuous text to one or more sentences​
    7·1 answer
  • Why are men more exposed to mass media?
    14·2 answers
  • How bridges are built over water
    14·1 answer
  • Javascript and java are really just two slightly different names for the same language.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!