1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
3 years ago
5

If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc

ial engineering techniques
Computers and Technology
1 answer:
katrin2010 [14]3 years ago
7 0

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

You might be interested in
Column A contains numbers from rows 1 to 20. You can use the formula (blank) to find the value of the largest number divided by
storchak [24]
This question can easily be answered if you have an idea about handling spreadsheet applications.

Let's say MS Excel
<span>Column A contains numbers from rows 1 to 20. You can use the formula _______ to find the value of the largest number divided by the total number of value.

In MS Excel, the formula MAX ( ___ ) and COUNT ( ____ ) to get the value
= MAX(A1:A20) / COUNT(A1:A20)</span>
6 0
3 years ago
Read 2 more answers
Using the 4 Cs, we consider where a company may decide to offer the product or service to customers. Whether online or in a phys
DanielleElmas [232]

Answer:

"Place" in the 4P's.

Explanation:

The 4C's marketing model was formulated in the year 1990 by Robert Lauterborn. The 4C's comprises of; Customer value, Cost, Convenience, and Communication. It is important to know that this marketing model is an improvement of the 4P's model.

Convenience implies that any product being marketed has to be made easily accessible to the customers. The location should also make it possible, that the product is easily seen by the customers.

Place was a concept in the 4P's model that sought to resolve the problem of where the product can be best distributed. The introduction of Convenience in the 4C's improved on it, and extended it to imply that there must be a high level of accessibility of the product.

3 0
3 years ago
Are there any tips or helpful advice for people who want to learn Photoshop?
stepan [7]

I feel like it is best to mess with it some with pictures you don't care about so you can see what would and what doesn't. that is how my sister did it and she take some grad pics. there are probably classes to

3 0
4 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
nata0808 [166]

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

8 0
3 years ago
write a program that generates 100 random integrs between 0 and 9 and displays the count for each number. (Hint: Use (int) (math
Nataly_w [17]

Answer: The java program to generate 100 random numbers and count their occurrence is shown below.

import java.util.Random;

import java.util.*;

public class MyClass {

   public static void main(String args[]) {

     int[]count = new int[10];

// temporarily stores the randomly generated number

     int num;

     for(int i=0; i<10; i++)

     {

// initialize count of all digits from 0 to 9 to zero

           count[i] = 0;

     }

     for(int i=0; i<100; i++)

     {

// generates 100 random numbers or integers from 0 through 9

           num = (int) (Math.random() * 10);

           for(int j=0; j<10; j++)

           {

// compare each randomly generated number with digits from 0 to 9 and increment their count accordingly

               if(num == j)

                   count[j] = count[j]+1;

           }

     }

     System.out.println("The count of randomly generated numbers is shown below.");

     for(int i=0; i<10; i++)

     {

           System.out.println("Count of "+i+" is "+ count[i]);

     }

   }

}

OUTPUT

The count of randomly generated numbers is shown below.

Count of 0 is 10

Count of 1 is 8

Count of 2 is 13

Count of 3 is 10

Count of 4 is 9

Count of 5 is 13

Count of 6 is 7

Count of 7 is 11

Count of 8 is 9

Count of 9 is 10

Explanation: This program declares an integer array of size 10 and initializes it to 0.

Random numbers are generated as shown. The number is randomly generated in an outer for loop with executes 100 times for 100 numbers.

(int) (Math.random() * 10)

The package java.util.Math is imported to serve the purpose.

The above code generates random numbers which can be floating numbers. The integer part is extracted using (int).

This yields the digits from 0 through 9.

For every occurrence of digits from 0 to 9, the count of the index of the respective digit is incremented.

To serve this purpose, inner for loop is implemented. The variable used in this loop is compared with the random number and index of count incremented accordingly. The inner for loop runs 10 times at the maximum, in order to match random number with 0 through 9.

Lastly, the occurrence of every digit from 0 to 9 is displayed.

8 0
4 years ago
Other questions:
  • What are Three types of informational references
    9·2 answers
  • Which of the following is a/are question(s) that you should ask before you create an Access report?
    10·1 answer
  • If you plan on operating several applications at s time, the amount of RAM should be considered when purchasing a computer
    10·2 answers
  • What are the useful techniques in program design?
    12·1 answer
  • Why is the keyboard calledQWERTY
    5·2 answers
  • This graph shows a relationship between the height of a giraffe and its weight which term describe the dashed line through the g
    15·2 answers
  • (PYTHON) Write a program that uses this technique to read a CSV file such as the one given above. Display the IDs and names of t
    14·1 answer
  • Plsss help anyone PLSSSSS ​
    13·1 answer
  • Write a loop that inputs words until the user enters STOP. After each input, the program should number each entry and print in t
    10·2 answers
  • What does it mean to prioritize tasks?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!