1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
2 years ago
11

How do cyber criminals target user’s end devices?

Computers and Technology
2 answers:
-BARSIC- [3]2 years ago
6 0

Answer: they hack in your device and change all your passwords so that so you can’t get in maybe i don’t know

Explanation:

lidiya [134]2 years ago
4 0
They hack into the account and start messing with people
You might be interested in
What tool might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrati
Soloha48 [4]

A tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations is: Whois.

<h3>What is a DNS server?</h3>

A DNS server can be defined as a type of server that is designed and developed to translate domain names into IP addresses, so as to allow end users access websites and other internet resources through a web browser.

This ultimately implies that, a DNS server refers to a type of server that translate requests for domain names into IP addresses.

In this context, we can infer and logically deduce that Whois is a tool which might be used by an attacker during the reconnaissance phase of an attack to glean information about domain registrations.

Read more on a domain names here: brainly.com/question/19268299

#SPJ1

4 0
1 year ago
Which of the following<br> Services are<br> functions performed<br> by the general office?
GaryK [48]

Answer:

comment the choices please

6 0
2 years ago
Eva is the network architect for her company's large cloud deployment; she has interconnected her private cloud to a community c
ivann1987 [24]

Answer:

The appropriate response is "Cloud bursting".

Explanation:

  • A strategy for the implementation of a program in a proprietary cloud or network infrastructure that explodes onto a public cloud if availability or production for computational power increases, could be considered Cloud bursting.
  • It enables extra cloud capabilities throughout cases where additional facilities have been required.
6 0
2 years ago
True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
elena-14-01-66 [18.8K]

Based on computing network operation, it is <u>false</u> that VLANs in cloud computing are most likely to be found on direct connections with a CSP.

<h3>What is VLAN?</h3>

VLAN is an acronym of Virtual Local Area Network that establishes its broadcast domain which enables network admins to combine hosts regardless the hosts are connected on the same network switch or not.

Given that the VLAN created its broadcast domain, you are likely not found it on direct connections with a CSP.

Hence, in this case, it is concluded that the correct answer is False.

Learn more about VLAN here: brainly.com/question/6769174

8 0
2 years ago
Frame from one LAN can be transmitted to another LAN via the device is:_____.
andreyandreev [35.5K]

Answer:

B) Bridge.

Explanation:

LAN refers to a local area network in which the network of computer are interconnected in less than an area which is limited i.e. school, university, residence, office building, etc

It is used to share a common line of communication within a less geographic area.

In order to transmit one LAN to the another LAN, the device we called as a bridge

Therefore the correct option is B. bridge

3 0
3 years ago
Other questions:
  • GenXTech is a growing company that develops gaming applications for military simulations and commercial clients. As part of its
    9·1 answer
  • 2. What is “suspension of disbelief?” Which form of immersion is it most closely associated with?
    9·2 answers
  • What kinds of online behaviors could be considered cyberbullying?
    7·2 answers
  • Clusters always occur in multiples of what? <br> A.)10 <br> B.)5<br> C.)2 <br> D.)100
    10·2 answers
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • I need help with writing the code in Python that draws an arrow pointing to the right.
    15·1 answer
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • Question 1
    10·2 answers
  • By the mid-1990s, how did revenue generated from video games compare to revenue generated from movies?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!