1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
12

You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows so

me accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately.
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.
Computers and Technology
1 answer:
creativ13 [48]3 years ago
5 0

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

You might be interested in
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
il63 [147K]
Answer: An evil twin attack poses as a legitimate AP.<span />
7 0
3 years ago
How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
Usimov [2.4K]
Answer: 14 channels are available in the unlicensed 2.4 GHz ISM band.
3 0
3 years ago
What is work immersion and its nature​
Kobotan [32]
Work Immersion refers to the subject of the Senior High School Curriculum, which involves hands-on experience or work simulation in which learners can apply their competencies and acquired knowledge relevant to their track.
3 0
3 years ago
What kind of bond is created by the attraction between atomic particles of opposite charge?
Veseljchak [2.6K]
That is called an lonic bond.

Ionic bonds are formed between elements with greater than 1.4 electronegative variance and to a lesser extent by first ionization energy variance, such as alkali metals and nonmetal halogens for example. The element of lesser electronegativity, the cation, donates an electron(s) from it's valance shell to the element with the greater electronegativity, the anion, which accepts the electron(s) unto it's valance shell. This bond is extremely strong and has a high melting point but because of waters polar nature this type of bond, usually, not always, disassociates in water.
5 0
3 years ago
Read 2 more answers
Question 8 of 10
Feliz [49]

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

4 0
3 years ago
Other questions:
  • Which description best describes how mass spectroscopy is useful in the field of forensic toxicology
    6·1 answer
  • A standard science experiment is to drop a ball and see how high it bounces. Once the bounciness of the ball has been determined
    10·1 answer
  • As Alexa types a message, Outlook autosaves the message at various points. In which folder is the message located if Alexa wants
    15·2 answers
  • Wow, in this century, technology have been the most valuable. What is the worst of using the hi-tech phones
    13·2 answers
  • . Describe a way to simplify a complex problem.
    8·1 answer
  • Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their
    6·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the Internet that support
    10·1 answer
  • What is<br> a an<br> output device
    10·1 answer
  • The project team is creating detailed documents to guide the team. What phase of the project life cycle are they in?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!