1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
9

Exposing employee and customer personal data to an untrusted environment is an example of:

Computers and Technology
1 answer:
jonny [76]3 years ago
8 0

Answer:

data breach

Explanation:

A data breach is a security event in which a unauthorized person steals, copy, access or transfer personal or confidential data. A data breach is the deliberate or unintentional leak of sensitive data into an distrusted environment. When a perpetrator or cyber criminal effectively invades a data source and steals confidential information, a data breach happens. This can be achieved physically by manipulating a device or network to steal or hack local data. Data breach is being used to target companies mostly by remotely bypassing network security.Data breaches include financial and personal information, trade secrets of companies or intellectual property, files, confidential documents etc.

You might be interested in
. Which of the following is NOT a
joja [24]

Answer:

solution

Explanation:

The correct option is - solution

Reason -

To solve a problem,

Firstly we give input , then system will process that input which then gives output.

Solution is not a part of the process.

So, Solution is not a significant part of a simple problem.

7 0
3 years ago
1. What is Visual field? <br>please explain with reference​
marishachu [46]
Visual field: The entire area that can be seen when the eye is directed forward, including that which is seen with peripheral vision
6 0
4 years ago
A Deep Vee hull is more likely to "capsize" (overturn) than a round bottom hull?
andrew-mc [135]
True gieofjeicjegkoekcoektkgkvnrnfkenfjenfkfj
8 0
3 years ago
A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
aev [14]

Answer:

<em>Full control</em>

Explanation:

Full control permission enables users to access, compose, alter, and  remove documents and sub-folders.

Additionally, for all documents and  sub-directories, users can alter permissions settings.

Users are able to modify permissions and take file possession.

8 0
4 years ago
Imma say something random...
Fynjy0 [20]

Answer:

Uh I don't understand what you said.

Explanation:

N/A

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following formulas would you use to calculate the power requirements of an electrical load? 
    5·1 answer
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
    9·1 answer
  • What is the easiest way to beat all of the fnaf games without getting killed and beating all of the nights?
    8·2 answers
  • Identify and describe the four fundamental configurations that are the basis of most Windows printer deployments and describe ho
    11·1 answer
  • A radio and communications security repairer is responsible for both radio and satellite communication systems.
    6·2 answers
  • What is the pencil tool in photoshop
    9·2 answers
  • 9.
    8·1 answer
  • bailey reads wikis at the beginning of his research project to get his bearings on the topic. he switches to peer-reviewed journ
    10·1 answer
  • Draw a circuit with a 12-volt battery and two resistors(100 ohms and 200 ohms) in parallel. What is the total resistance of the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!