1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
6

1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your

organization’s IT infrastructure?
Computers and Technology
1 answer:
enyata [817]3 years ago
4 0

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

You might be interested in
Please help ASAP!!! :))
Talja [164]

Answer:

You can upgrade the OS by applying SECURITY patches to the server

Explanation:

I can't think of anything else it could be

3 0
3 years ago
A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.
OverLord2011 [107]

Answer:

Average speed = 6 km/h and Average velocity = 0.67 km/h

Explanation:

Given that,

A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.

(a) Average speed = total distance traveled divided by total time taken

Distance = 10+8 = 18 km

Total time = 2+1 = 3 h

Average speed = (18/3 )km/h= 6 km/h

(b) Average velocity = net displacement divided by total time taken

Let north is positive and south is negative

Displacement = 10+(-8) = 2 km

Total time = 2+1 = 3 h

Average velocity= (2/3 )km/h= 0.67 km/h

3 0
3 years ago
Luke is working on a layout for a catalog. He adds cross lines on the four corners of the layout to mark out a small extra margi
Savatey [412]

Cross lines that are added on the four corners of a layout to mark out a small extra margin is called: D. trim.

<h3>What is layout design?</h3>

Layout design can be defined as a graphical design process that involves the use of one or more grids for the design of a catalog and system, so as to make the designs visually appealing to end users.

In a layout design, trim refers to the cross lines that are added on the four (4) corners of a layout to mark out a small extra margin.

Read more on layout design here: brainly.com/question/13732745

8 0
2 years ago
Which of the following is not an operating system a) boss b) window xp c) linux d) bindux​
zmey [24]

Answer:

boss is not an os

Explanation:

boss is a former of Linux hope this helped

5 0
3 years ago
What does pagination mean in Microsoft Word?
marin [14]

it means to alt f4 then that would help so it can eat the microscope then have it digested

5 0
3 years ago
Read 2 more answers
Other questions:
  • Is microsoft word the same as microsoft office?
    12·2 answers
  • . What is the output of this code sequence?
    8·1 answer
  • Explain the role of the network layer and Internet protocol (IP) in order to make internetworking possible.
    8·1 answer
  • Jerry can use an <br> program to restrict information from going out without his permission.
    12·2 answers
  • Which statement is true about hacking?
    11·2 answers
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • In cell J6, insert a formula using the OR function that returns TRUE if the rating (cell 16) equals "A" or the email reminder (c
    5·1 answer
  • Creation of network is known as…?
    12·2 answers
  • Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!