Answer:
Install recommended updates.
Explanation:
To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.
Answer: c) Click on a different sheet tab at the bottom.
Explanation:
To change between worksheets inside an Excel Workbook : Click on a different sheet tab at the bottom
Answer: well there are many types of software out there and let's use Microsoft for an example there a really protective company so more people would want to buy from Microsoft they have a lot of high-tech computers so and I'm not favoriting Microsoft it's just what I've use Chrome also is really good but you would kind of want to go off like reviews that you see and everything like that because I'm not a big computer tech but that's just what I know
Explanation:
<span>A. Mechanical i think sorry if im wrong</span>