answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
2 years ago
10

Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consi

dered a ______ the network and to the users who must access the network.
Computers and Technology
2 answers:
Svetlanka [38]2 years ago
7 0

Answer: Vulnerability of

Explanation:

The network administrator was able to identify that virus before it led to denial of service to users. Since it has been discovered, it is no longer a threat as measures will be taken to eliminate it. But a virus that was successful uploaded shows how vulnerable the system is or how bad the security protections put in place are. Steps has to be taken to ensure it does not reoccur.

Yuri [45]2 years ago
4 0

Answer:

Threat to

Explanation:

Cyber attackers exploit system and network vulnerabilities to steal or temper with data in the network. They possess programming and networking skills to hack a network. They use malicious softwares or malwares to bypass security policies and to creat and exploit vulnerabilities in the network.

Virus, worm, rootkit, trojan horse, keylogger etc are examples of malware used by cyber attackers or hackers. They are threats to computer systems in a network as they weaken the security of the network.

You might be interested in
The _______________ domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart
viva [34]
The answer is <span>workstation.   </span>The workstation domain refers to any endpoint device used by end users, which includes but is not limited to mean any smart device in the end user's physical possession and any device accessed by the end user, such as a smartphone, laptop, workstation, or mobile device.
5 0
2 years ago
If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
Aleonysh [2.5K]

Answer: C. Live

Explanation:

A live acquisition is where data is retrieved from a digital device directly via its normal interface such as activating a computer and initiating executables. Doing so has a certain level of risk because data is highly likely to be modified by the operating system. The process becomes significantly more common likely with less available disk space to the point of completely impractical to image.

7 0
2 years ago
Explain an application of a data communication system, including issues encountered with implementing the application.
aleksandrvk [35]

Answer:

Data communication system is referred to the exchange of information between the sender and receiver by use of transmission media.

Explanation:

The data communication system is referred to as the exchange of information between the sender and receiver by the use of transmission media.

some application of data communication system are;

videoconferencing,  

instant messaging

Telnet, etc.

In the data communication system, one information is transferred is transmission circuit then the media transfer the information to the receiver into the desired format.

the main issue is:

- data privacy

- cost of implementation

- use of the system for personal used during working hour

6 0
2 years ago
Hyper Text Transfer Protocol (HTTP) and Secure HTTP (HTTPS) are the same protocol from a standpoint of passing or blocking them
earnstyle [38]
Answer is false...,.....
5 0
2 years ago
The path to the distribution share should always be referred to by the ____ path to ensure that it can be accessed over the netw
ch4aika [34]

Answer:

The answer is "Option D".

Explanation:

In the network, the UNC defines a related file with the removable drive from, which the file is stored without needing interpretation. It is used to ensure, that unguarded computers can be accessed across the network and other options, that can be clarified in the following terms which are not correct:  

  • In option A, It is used to manage computers and other devices on the internet, that's why it is wrong.
  • In option B, It is also known as a server that manages network security, that's why it is wrong.
  • In option c, It is used in software designing, that's why it is wrong .
6 0
2 years ago
Other questions:
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • 1. What is the global marketplace?
    11·2 answers
  • Emma wants to create a website that will contain mostly textual information pertaining to book reports she has to create. Which
    14·2 answers
  • Does the Boolean expression count &gt; 0 and total / count &gt; 0 contain a potential error? If so, what is it?
    8·1 answer
  • Which situation best describes the prosumer effect?
    7·1 answer
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    11·1 answer
  • Ciscon Telecom is a mobile operator in the European Union. The company provides personalized services to its customers, and its
    8·2 answers
  • In this assignment, you are provided with almost-working code that establishes a TCP socket connection over the INET domain (tho
    11·1 answer
  • Consider two vectors that are NOT sorted, each containing n comparable items. How long would it take to display all items (in an
    8·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!