1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
3 years ago
6

1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your

organization’s IT infrastructure?
Computers and Technology
1 answer:
enyata [817]3 years ago
4 0

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

You might be interested in
Which staff member takes a set of plans and supervises their construction?
jekas [21]

Answer:

Technical director

Explanation:

Someone else's models and designs ,building, decoration, installation, service, hit, and processing supervises by the technical director.

6 0
3 years ago
A(n) _____ access file is also known as a direct access file.
zloy xaker [14]
The answer to the question asked  above is <span>remote direct memory .

</span>A remote direct memory  access file is also known as a direct access file.

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

5 0
3 years ago
What should we do to protect data
puteri [66]
Six Easy Steps You Can Take To Protect Your Data Online
Protect Passwords. Lock your phone with a strong password and fingerprint or Touch ID. ...
Turn off Lock Screen Notifications. ...
Lock Your Apps. ...
Hide Your Photos. ...
Use A Private Number. ...
Keep Your Browsing Secret.
3 0
3 years ago
Then create a new Java application called "StringSlicer" (without the quotation marks) that uses methods to:
anyanavicka [17]

Answer:

See the explanation section

Explanation:

import java.util.*;

//The above statement is to import the Scanner and ArrayList class

public class StringSlicer {

   public static void main(String args[]) {

   Scanner scan = new Scanner(System.in);

   System.out.println("Enter your string: ");

   String inputString = scan.nextLine();

   

   ArrayList<Character> stringList = new ArrayList<Character>();

   for(int i = 0; i < inputString.length(); i++){

           stringList.add(inputString.charAt(i));

       }

       

   for(Character letter: stringList){

           System.out.println(letter);

       }

   }

}

5 0
4 years ago
Which of the following is the 1's complement of 10?
OverLord2011 [107]
Flip 10 and you get 01 then you add 1 to it:
1
01
+ 1
-----
1 1

So, C. 11
6 0
3 years ago
Read 2 more answers
Other questions:
  • Splunk In most production environments, _______ will be used as the source of data input?
    12·1 answer
  • The ________ occurs when the user presses the enter key without typing a value for an input operation.
    5·1 answer
  • The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
    9·1 answer
  • Consider a system that contains 32K bytes. Assume we are using byte addressing, that is assume that each byte will need to have
    10·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • What are some other features of sending attachments in Outlook 2016? Check all that apply.
    9·2 answers
  • Can use some help with Computer Networking, with a focus on routing protocols. Part A: Which of these routing protocols is the o
    5·1 answer
  • Which of the following describes all illustrations created by freehand?
    15·1 answer
  • How can you make your MakeCode micro:bit program display either the letter<br> A or the letter B?
    11·1 answer
  • What purpose does encryption on the internet serve? Why is it so important?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!