1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
11

what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers

Computers and Technology
1 answer:
Radda [10]3 years ago
4 0

Answer:

The answer is below

Explanation :

If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.

This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."

You might be interested in
Write a function called printbackwards() that will work with a c++ string
stiks02 [169]
There is a standard reverser that will work for this:

void printbackwards(string s)
{
   reverse(s.begin(), s.end());
   cout << s;
}


6 0
3 years ago
What kind of a bug is 404 page not found
Allisa [31]

Answer:A 404 error is often returned when pages have been moved or deleted. ... 404 errors should not be confused with DNS errors, which appear when the given URL refers to a server name that does not exist. A 404 error indicates that the server itself was found, but that the server was not able to retrieve the requested page.

Explanation: Hope this helps

7 0
3 years ago
Read 2 more answers
When you use the ip address of the web server, the correct site is displayed?
jekas [21]
No. Using the address will get you either the default site, or the first site declared. Web servers can host VirtualHosts, and rely on the site name to know which VirtualHost to serve. TMI, it's called name based virtual host, as opposed to the machine having many addresses then address based virtual hosts can be created.
6 0
3 years ago
Is the cell phone changing our views about polite and impolite behavior? For example,
DochEvi [55]

*This question seems like an opinion based question, but here is my opinion on the matter:

Yes the cell phone is changing our views of what is polite and impolite. It is indeed impolite to talk on your phone while you are ordering a drink at Starbucks, because then you aren't focusing on ordering instead you are focused on your phone call which can interfere with your ordering.

Hope this helps!

8 0
3 years ago
Read 2 more answers
Explain how AI smartphone software in the rental car can be a threat to privacy.
Elan Coil [88]

Answer:

The real reason why AI smartphone software in the rental car is threat to privacy is that the data transmitted can actually be exposed to security breaches in the software and so if that happens, the car is no longer under the control of the user.

Hope this helps!

4 0
3 years ago
Other questions:
  • Which activity constitutes legal computer activity?
    12·1 answer
  • How to go to a website with an ip address?
    15·1 answer
  • For which task is the WordArt gallery most useful?
    15·2 answers
  • The term Electronic Privacy Information Center (EPIC) refers to a form of the digital subscriber line technology, which enables
    6·1 answer
  • Write a function called convert_format which converts the format of a date from mm/dd/yyyy to month name dd, yyyy.
    12·1 answer
  • Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
    13·1 answer
  • Beth would like to run an nmap scan against all of the systems on her organization's private network. These include systems in t
    15·1 answer
  • Plz help fast! will mark brainliest!<br><br>List three ways that music is used in modern society.
    6·1 answer
  • All banks follow the same guideline for determining if an applicant qualifies for a loan.
    13·1 answer
  • Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!