1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
9

Exposing employee and customer personal data to an untrusted environment is an example of:

Computers and Technology
1 answer:
jonny [76]3 years ago
8 0

Answer:

data breach

Explanation:

A data breach is a security event in which a unauthorized person steals, copy, access or transfer personal or confidential data. A data breach is the deliberate or unintentional leak of sensitive data into an distrusted environment. When a perpetrator or cyber criminal effectively invades a data source and steals confidential information, a data breach happens. This can be achieved physically by manipulating a device or network to steal or hack local data. Data breach is being used to target companies mostly by remotely bypassing network security.Data breaches include financial and personal information, trade secrets of companies or intellectual property, files, confidential documents etc.

You might be interested in
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
2 years ago
whats that system tool the rearranges files and unused space on the hard drive so programs can run faster
Zolol [24]
The Disk Fragmenter.
5 0
2 years ago
Read 2 more answers
Discus four importance of applications software​
AlladinOne [14]

Answer:

l hope this helps Good luck.

6 0
3 years ago
The Linux operating system is an example of Group of answer choices free-market software. open-source software. pirated software
MrMuchimi

Linux is one of the most prominent examples of free and open-source software collaboration. The source code may be used, modified and distributed commercially or non-commercially by anyone under the terms of its respective licenses, such as the GNU General Public License.

3 0
1 year ago
Which of the following is not freshwater ecosystem
Phoenix [80]
<h2>Wetlands are not considered freshwater ecosystems as there are some, such as salt marshes, that have high salt concentrations — these support different species of animals, such as shrimp, shellfish, and various grasses</h2>

8 0
2 years ago
Other questions:
  • Lance has three tables in his database he wants to generate a report to show the data from the three table so he decides to link
    6·2 answers
  • Write the definition of a function divide that takes four arguments and returns no value . The first two arguments are of type i
    8·1 answer
  • What does this translate to?: 01001001 01110011 00100000 01100010 01110010 01100001 01101001 01101110 01101100 01111001 00100000
    5·1 answer
  • Help to how to write pseudo code to insert a new node to Binary Search Tree. Using C++.
    15·1 answer
  • 13. A 2-sided coin has an equal likelihood of landing on each side. One side is called "heads" and the other is called "tails".
    11·1 answer
  • Which command group on the Slide Master tab is used to add headers, footers, and other placeholders to the slide
    13·2 answers
  • Where you should go to find out what access the system and users to a file ​
    5·1 answer
  • Suppose that you have the following declaration:
    7·1 answer
  • Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
    5·1 answer
  • Assume you have a button control named btndisplaylist. Which is the default name for an event procedure that will be executed wh
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!