1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
algol13
2 years ago
10

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast

ing the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?
A. Evil twin
B. Wardriving
C. Bluesnarfing
D. Replay attack
Computers and Technology
1 answer:
Kamila [148]2 years ago
8 0

Answer:A) Evil twin

Explanation: Evil twin is a type of attack that happens in the network. This behaves as the alias wireless access point(WAP) which appeals toward users to get connected with false hotspot to steal their personal information.This attack is based on the rogue hotspot .Barry has also faced a evil twin attack while passing by a building and getting his device connected with fake hotspot.

Other options are incorrect because war driving is searching for the internet connectivity while driving,blue snarfing is done with Bluetooth to steal personal data and replay attack in which the transmitted data is repeated in malicious way.Thus, the correct option is option(A).

You might be interested in
When a computer is suffering from a virus, you can use a compiler to help remove the virus. True or false?
ipn [44]
True I think because it helps right?
8 0
3 years ago
Jax earned 144 points on a research project. In this situation, what is the number 144? Group of answer choices data information
fredd [130]

Answer: data

Explanation:

Data refers to symbols or numbers that aren't meaningful. It's an an individual unit which consists of raw materials. Data hato be interpreted in order to become meaningful. They are fact or figures. Examples of data include 24, London, 144 etc.

Information on the other hand is a data that has been processed. e.g. Bob has an aggregate score of 144. Based on the question given, the number 144 is a data as it isn't meaningful yet.

3 0
2 years ago
Which type of profile allows a user within a corporation to use the same user profie regardless of the computer that user is usi
zzz [600]

Answer: c)Roaming user profiles

Explanation:Roaming user profiles are those profiles that creates the copy from the local profile and get stored in the network server. Roaming user profiles haves the function of getting logged in any computer system that the user is processing by getting downloaded.

It has the advantage of not creating profiles on every computer system that user wants to login .Thus, the correct answer is option(c) because other profiles mentioned in the option cannot copy the profile in the server and so do not have capability to be accessed in other computer system.

8 0
3 years ago
You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private
Oksana_A [137]

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

4 0
2 years ago
Michael works for a graphic design firm. He is creating an informative poster. He needs to add a great deal of text in the poste
Dennis_Churaev [7]

Michael will use a Adobe Photoshop or CorelDraw   tool to help format the text for creating an informative poster.

<h3>What application is used for graphic design?</h3>

They are:

  • Adobe Photoshop
  • Illustrator, GIMP
  • CorelDraw
  • Canva  and others

Based on the American Institute of Graphic Arts (AIGA), graphic design is known to be a term that is described as “the art and method of planning and bringing forth ideas and experiences along with the use of visual and textual content.”

Therefore, Michael will use a Adobe Photoshop or CorelDraw   tool to help format the text for creating an informative poster.

Learn more about graphic design from

brainly.com/question/27019704

#SPJ1

3 0
2 years ago
Other questions:
  • You are attempting to update a Windows image that has been mounted under C:\mount on your local system. What command must you us
    13·1 answer
  • What happens if you move unencrypted files into an encrypted folder?
    5·1 answer
  • Why did Hunter gatherers moved into the<br>America's?​
    8·1 answer
  • Which of the following sentences is accurate? a. PDF stands for "Proofreading Direct Files." b. PDF files cannot be edited. c. B
    9·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • In order for a fault-block mountain to form, a ______ must take place along a fault line and one side must be ________.
    11·1 answer
  • Can both mediated interpersonal communication and mass communication has an ability to reach huge number of recipients or audien
    11·1 answer
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
  • How do you code to find the surface area 6 s2, volume s3 in python
    6·1 answer
  • What are the methods of gilding<br><br>nonsense will be immediately reported. ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!