answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkasestr [34]
2 years ago
6

Several surprising findings were revealed in the wake of the Target breach, providing a cautionary tale for all executives and s

ecurity professionals. Which of the following was not thought to have occurred during the Target security breach?
a. Target had security software, but the notification alerts from the software were
ignored.
b. Target had properly installed and configured its security software, but hackers got in,
anyway.
c. Credit card databases were on entirely separate systems, not connected to other parts
of the firm’s information system, but wireless networking allowed hackers to access
anything reachable from a cell phone connection.
d. Target regularly monitored file names and matched them to file sizes and archival
copies to ensure that software was not installed on their systems using the names of
legitimate products, but hackers saved files with blank file names so they wouldn’t be
detected.
e. All of the above
Computers and Technology
1 answer:
Akimi4 [234]2 years ago
6 0

Answer: (a) Target had security software, but the notification alerts from the software were  ignored.

Explanation:

The security software was there in target but its notification alerts being ignored was something which was not thought to have been occurred during the Target security breach, as anyone could be alerted with the notification alert.

You might be interested in
Scenario 1: Richman Investments provides high-end smartphones to several employees. The value of each smartphone is $500, and ap
vfiekz [6]

Answer:

a). SLE =$37.5

b). ARO =75

c). ALE = $2,812.5

Explanation:

a).Single loss Expectancy (SLE) is starting point in determining the single loss of an asset that will occur and calculated this;

SLE = asset value * exposure factor.

Asset value =$500,

Exposure factor is simply the percentage of asset lost.

In this case out of 1000 phones, 75 were damaged or loss.

In percentage;

75 ÷ 1000 =0.075, 0.075×100=7.5%(exposure factor).

Therefore,

SLE = $500×7.5%= $37.5.

b). ARO - Annual Rate of Occurrence is the number of times a threat on a single asset is expected to occur in one year.

In the case the damage or loss occured in 75 devices in one year.

c). ALE - Annualized loss Expectancy is the product of SLE and ARO.

Therefore;

ALE = $37.5 × 75 = $2,812.5.

3 0
2 years ago
A feature on a new computer with Windows preinstalled. When you take it out of the box and turn it on, you will be greeted with
BlackZzzverrR [31]

Answer:

Explanation:

In the newer versions of windows, there are a variety of sign-in methods, these include facial recognition, fingerprint scanner, username & password, or Microsoft email sign in. The choice is yours at the end of the Out-of-box experience which is the entire setup experience that the consumer has when first preparing the new windows installation on the computer that they have. Some of the options may require additional hardware on your PC such as a fingerprint scanner or a webcam for facial recognition.

6 0
2 years ago
When researching which keywords should be included in a résumé, what four sources are valuable resources?
zimovet [89]
I would suggest the following sources

1) job postings - those offer include the phrases that the employers themselves want to hear

2) keyword lists - they're made for looking for keywords!

3) professional site's skills sections. You could use LinkedIn or any other professional site.

4)Sometimes you can find software that can suggest keywords for you
4 0
2 years ago
Read 2 more answers
Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after th
Sindrei [870]

Solution :

#include<$\text{stdio.h}$>

#include<conio.h>

void dec_bin(int number) {

$\text{int x, y}$;

x = y = 0;

for(y = 15; y >= 0; y--) {

x = number / (1 << y);

number = number - x * (1 << y);

printf("%d", x);

}

printf("\n");

}

int main()

{

int k;

printf("Enter No u wanted to right shift by 4 : ");

scanf("%d",&k);

dec_bin(k);

k = k>>4; // right shift here.

dec_bin(k);

getch();

return 0;

}

4 0
1 year ago
C# Write, compile, and test a program named PersonalInfo that displays a person’s name, birthdate, work phone number, and cell p
Soloha48 [4]

Answer:

#include <stdio.h>

#Include<iostream>

using namespace std;

//Define required function

PersonalInfo( )   {

    printf("Name   : Robert Josh\n");  

    printf("DOB    : July 14, 1975\n");  

    printf("Work Phone : 00-00000000\n");  

    printf("Cell Phone : 11-777777777\n");  

    return(0);  

 }

int main()   {

    //Call function

 PersonalInfo( );

 return 0;

 }

Explanation:

Its just a simple code to print required details when the function PersonalInfo is called.

5 0
2 years ago
Other questions:
  • Which programming element is used by a game program to track and display score information?
    10·2 answers
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • Which act was used to penalize Sara? Sara was found to be in possession of a controlled substance for which she had no justifica
    5·1 answer
  • A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
    5·2 answers
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
    8·2 answers
  • Three variables , x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts t
    9·2 answers
  • You discover many errors in a database table. What has been lost?
    15·2 answers
  • The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recomm
    9·1 answer
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    14·1 answer
  • What should businesses do in order to remain competitive under the current Cloud<br> landscape?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!