1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alecsey [184]
4 years ago
14

What is not an advantage of a computer network?

Computers and Technology
1 answer:
Nutka1998 [239]4 years ago
4 0

Answer:

C. Social Engineering

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In conclusion, social engineering being a form of cyber attack is not an advantage of a computer network.

You might be interested in
Tim is a project manager. He is brainstorming with his team about problems that could arise during the next phase of the project
Grace [21]

Answer:

b.

Explanation:

just took the quiz

8 0
2 years ago
What should be done with equipment that is at the end of its life cycle and that is being donated to a charity?
Solnce55 [7]

Answer: C) Sanitize it

Explanation:

The system and equipment needs sanitization when it reach at the end of the life cycle and must ensure that they does not included any type of the sensitive data. As, sanitization is the process of remove and destroy all the data store in the memory device.    

Removing CD and DVDs is also the part in sanitation but many other element such as disk drive needs to be checked to ensure that they does not contain any type of information or data.

Removing all the software license and installing the original software, they both are not necessary require in the sanitization process.

Therefore, Option (C) is correct.

7 0
4 years ago
An authenticated user can add up to how many computer accounts to the domain, by default
Brums [2.3K]
By default, 10 computers can be joined to the domain by both users and administrators. As long as a user is authenticated against the Active Directory, he or she can add up to 10 computers to the domain.
While this one posses as an advantage for smaller companies, it is not a desirable feature for bigger companies since they have to control more tightly who can add machines to their domain.
7 0
4 years ago
Its not letting me change my email, any way to fix this? Must include steps and how to fix this. (I am using a school email) ANS
AlexFokin [52]
You see, you just aren’t philosophical enough to understand an email. You don’t change the email, it changes you.
3 0
2 years ago
During wave motion, the motion of particles to one side of the rest position will be______ the motion to the other side of the r
DiKsa [7]
I think waves will be the same as the motion because their all going the same way if not im sorry and take the test again and pick b
5 0
3 years ago
Read 2 more answers
Other questions:
  • Using the CPI to calculate the inflation rate​ _______________ the underlying inflation​ rate, and using the core inflation rate
    7·2 answers
  • Checker for integer string (Please answer in C++):
    8·1 answer
  • A host device needs to send a large video file across the network while providing data communication to other users. Which featu
    8·1 answer
  • As a digital investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that
    13·1 answer
  • Bullet points on a slide should be limited to _____.<br><br> A. 2<br> B. 4<br> C. 8<br> D. 10
    7·1 answer
  • If you want to transfer information transform STM to LTM, it is essential that you make the information ______________________.
    9·1 answer
  • Which code segment results in "true" being returned if a number is even? Replace "MISSING CONDITION" with the correct code segme
    9·1 answer
  • Uinjsiodj9fijsdiokjdwe0okakj09dw9j09jw09
    9·2 answers
  • To manage OpenLDAP policies over Command Line Interface (CLI), a certain type of file is needed. What is this type of file calle
    7·1 answer
  • Why are digital signals an accurate and reliable way to record and send information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!