1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
15

How can your network be infected with malware and/ or ransomware?

Computers and Technology
2 answers:
anastassius [24]3 years ago
5 0

Answer:

Connecting an infected device can lead to ransomware encrypting the local machine and potentially spreading across the network. Typically this is inadvertent – a member of staff unwittingly plugs in an infected USB drive, which encrypts their endpoint – but it can also be deliberate.

stira [4]3 years ago
4 0

Answer:

Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. .Crypto ransomware, a malware variant that encrypts files, is spread through similar methods and has also been spread through social media, such as Web-based instant messaging applications.

Explanation:

You might be interested in
dion training just installed a new webserver within a screened subnet. you have been asked to open up the port for secure web br
ryzh [129]

The port that should be set as open to allow users to access this new server is port 443.

<h3>What is a Computer port?</h3>

In regards to computer hardware, a port is known to be a tool that helps to act as a kind of an interface that tend to exist between the computer as well as other computers or peripheral units or tools.

Note that  the port connote  the aspect of a computing device that is made available for connection to other forms of  peripherals such as input.

Therefore, based on the work above, the port that should be set as open to allow users to access this new server is port 443.

Learn more about port from

brainly.com/question/28391396
#SPJ1

6 0
1 year ago
What is the biggest problem with technology today?
Mariulka [41]

Answer:

Employee productivity measurements and too mich focus on automation.

5 0
3 years ago
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
mash [69]

Answer:

Neil should recommend to this client a star network.

Explanation:

A star network is a computer network where every host is connected to a central hub, switch, or computer.

Main advantage of a star network is that one corruption (unless it is central hub) doesn't affect the rest of the network, and it's easy to modify.

The star network is one of the most common computer network setups

6 0
3 years ago
What is the simplest way to permanently get rid of an unwanted file? A. Cancel the file. B. Go to the Start menu and then delete
Morgarella [4.7K]
Go to the Start menu and then delete the file <span>is the simplest way to permanently get rid of an unwanted file</span>
5 0
4 years ago
You type a complex formula in cell A20. You would like to make the same calculation in cells B20 through H20. To be efficient, y
larisa86 [58]

Answer:

Use autofill

Explanation:

In excel "autofill" is used to fill data in cells, which follows the pattern or logic applied in other cells. To apply same calculation of A20 in B20 to H20, we use autofill technique. Instead of copy pasting, or manually entering the complex formula this method is more suitable.  

4 0
3 years ago
Other questions:
  • Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. Given a variable modelYear write a statement that prin
    8·1 answer
  • A(n) _____ uses spatial and nonspatial data and specialized techniques for storing coordinates of networks of lines (roads, rive
    8·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • Why is printer an output device​
    14·2 answers
  • Assignment 1: silly sentences edhesive
    7·1 answer
  • 2. Define a function squareArea that computes the area of a square given side length
    14·1 answer
  • HELP ME!!!!!!! %) select all the correct answer. What will be the output of using the element in the given HTML code? 1011 2 A.
    6·1 answer
  • Please help me!! (two questions)
    12·1 answer
  • The specialized programs used by the operating systems to help ensure that memory is used properly and there are no memory confl
    15·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!