1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
6

100 POINTS!!!!!!!!

Computers and Technology
2 answers:
dlinn [17]3 years ago
7 0

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

raketka [301]3 years ago
3 0

Answer:

Option B

Securing Unattended Equipments

You might be interested in
What services are used to help speed the development and deployment of internal custom applications?
PtichkaEL [24]

A, Protocol

because An application service provider (ASP) is a business providing computer-based services to customers over a network; such as access to a particular software application (such as customer relationship management) using a standard protocol (such as HTTP).

7 0
3 years ago
Read 2 more answers
give the difference between functional and functional tools in the middle of to the circle give importance​
bija089 [108]

Answer:

hakkuna matata is the radious of a circle

5 0
3 years ago
With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
valkas [14]

Answer:

Your answer is initial-response field kit

Explanation:

7 0
2 years ago
Electrical data suitable for transmission is called a(n)
Deffense [45]

Answer:

Signal

Explanation:

4 0
3 years ago
Help me pls!!! last question
monitta

Answer:

tina.left(90)

Explanation:

In code if you want your character to turn left you put "left" in your code and if you want your character to go right type "right" and so on and so on so your answer is tina.left(90)

8 0
3 years ago
Other questions:
  • What is faster a hi-speed usb port or superspeed usb port?
    13·1 answer
  • Page orientation can be either landscape or _____.
    13·1 answer
  • On the Insert tab, select Table > _______ to create a table from selected text.
    14·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
    8·1 answer
  • What is application software used for
    13·1 answer
  • (Please answer both parts, please)
    8·2 answers
  • List out any four hardware and software components required for multimedia​
    10·1 answer
  • The residual volume can be measured directly with: Select an answer and submit. For keyboard navigation, use the up/down arrow k
    12·1 answer
  • What can you do to make sure no one outside your company can gain access to its wireless network?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!