1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
6

100 POINTS!!!!!!!!

Computers and Technology
2 answers:
dlinn [17]3 years ago
7 0

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

raketka [301]3 years ago
3 0

Answer:

Option B

Securing Unattended Equipments

You might be interested in
Someone please explain me this​
Ipatiy [6.2K]

Answer:

2×4×6×8× your body

Explanation:

your pottery × 2×4×6×8×10

7 0
3 years ago
A web page without a bibliography, or sources, is an indicator of an unreliable site.
alisha [4.7K]
A.True because without a source then it could just be made up.......hope this helps :)

5 0
3 years ago
Read 2 more answers
What is a Network?
navik [9.2K]

Answer:

Letter A

Explanation:

Think about it like a web

6 0
3 years ago
Read 2 more answers
Alright, so im currently trying to pass a computer science class. i need it done in a little under 2 weeks. Ill just ask the one
Alla [95]

Answer:

B. Mesh

Explanation:

5 0
3 years ago
What is a best practice when approaching an automation effort?
Ksivusya [100]

Answer:

improving the current process before automating it

6 0
3 years ago
Other questions:
  • Add the number <br><br> 10010110+10111101
    12·2 answers
  • A document that promises to pay specified sums of money on specified dates and is a debt to the issuer is called
    14·1 answer
  • A _______ acts as a security buffer between a corporation's private network and all external networks.
    7·1 answer
  • Which is true about routers and switches?
    12·1 answer
  • What's a listserver ?
    8·1 answer
  • Which two technologies support the building of single-page applications? and are two technologies helpful in building single pag
    12·1 answer
  • Complete the function by filling in the missing parts. The color_translator function receives the name of a color, then prints i
    11·1 answer
  • 1. ¿Cuál es el papel de la voz en la radio?
    10·1 answer
  • The process of learning by making mistakes and by trial and error is called _____.
    6·1 answer
  • A market-product strategy that requires no change in the basic product but instead seeks new buyers is known as ______
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!