If there are cyber threats and vulnerabilities to your system, what does that expose you to ?


Answers

Answer 1

Answer:

It introduces the possibility of hackers or attackers targeting your system.

I hope this answers your question!


Related Questions

Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive information on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on.

Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?

Answers

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

What is  Vulnerability scanning?

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

Verify a threat exists.Bypass security controls.Actively test security controls.Exploit vulnerabilities.

Learn more about penetration test  from

https://brainly.com/question/26555003

Sounds can be played in the background and loop continuously
False
True

(Scratch Coding)

Answers

Answer:

True.

Explanation:

I think use the key repeat over your sound to make it loop

What are variables? Write the name of any two types of variables.

Answers

Answer:

A variable is an identifier which changes the values given to it when the program is being executed.

e.g. - var count : integer

var avg : real

Explanation:

as a rule, is a leak is found what should be done

Answers

Answer:

Refrigerant leaks detected at compressor crank 

Explanation:

Discuss Network Heighbourhood lcon?

Answers

Answer:

Network Neighborhood was a desktop icon in Microsoft Windows NT, Windows 95, and Windows 98 that allows users to browse shared network resources on their computers. Using Network Neighborhood, you can browse resources on the network in the same way that you use My Computer to browse the resources on your local machine.

What is the hexadecimal value for the following, 0101

Answers

Answer:

5

Explanation:

Briefly explain the Infrastructure challenges, Technology transfer issues, and Product
and service challenges

Answers

Answer:

asymmetric information, market power, and externalities

Explanation:

An Internet Service Provider(ISP) has three different subscription
packages for its customers:

Package A: For $15 per month with 50 hours of access provided.
Additional hours are $2.00 per hour over 50 hours.
Assume usage is recorded in one-hour increments,


Package B: For $20 per month with 100 hours of access provided.
Additional hours are $1.50 per hour over 100 hours.


Package C: For $25 per month with 150 hours access is provided.
Additional hours are $1.00 per hour over 150 hours

Assume the Billing Cycle is 30 days.

The ISP has contracted us to write the application software for their
new Billing System.

We will do the project over the next two weeks:

WEEK 9 -- Write the Functions to do the tasks that we will be using
to develop the application in Week 10.
WEEK 10 -- Write an Interactive Console Application using the
Functions which you developed in Week 9.

===========================================================================
DESCRIPTION of PROBLEM SET for Week 9
===========================================================================

Write the Function Definitions for the following tasks needed by
the ISP Billing System.

getPackage
validPackage
getHours
validHours
calculatePkg_A
calculatePkg_B
calculatePkg_C
---------------------------------------------------------------------------
getPackage: get value (A, B, C) for selected package from the keyboard.

validPackage: ensure that the value entered is an (A,B,C).

getHours: get value (0 - 720) for hours of usage from the keyboard.

validHours: ensure that the value entered is between 0 and 720.

calculatePkg_A: calculates the monthly charges for internet usage
based on hours of usage when Package 'A' is selected.

Answers

Use the knowledge of computational language in C code to write a code that has three different subscription packages for its customers.

How to write code about sales?

To make it simpler the code is described as:

#include <iostream>

#include <string>

using namespace std;

int main() {

string package;

float time;

float price;

cout << "Choose package: ";

cin >> package;

// Package validation

if ((package == "A") || (package == "B") || (package == "C")) {

cout << "The number of hours: ";

cin >> time;

// Time validation

if (time <= 744) {

// Package A

if (package == "A") {

if (time > 50) {

price = 15 + (time - 50) * 2;

} else {

price = 15;

}

// Package B

} else if (package == "B") {

if (time > 100) {

price = 20 + (time - 100) * 1.5;

} else {

price = 20;

}

// Package C

} else if (package == "C") {

if (time > 150) {

price = 25 + (time - 150) * 1;

} else {

price = 25;

}

cout << "Price: $" << price;

}

See more about C code at brainly.com/question/19705654

Which popular video game franchise has released games with the subtitles World At War and Black Ops?

Answers

Answer:

Call of duty i think has released those games

Answer:

IT WAS CALL OF DUTY

Explanation:

1. this network device check the data package arriving from one computer and sends the data to a specific computer?
2. This network device sends the data packet from computer to all devices connected to it?
3. This network device connects a LAN to the Internet
4. This network device connects one LAN to another with the same protocol

Answers

Answer:

Explanation:

1. This network device check the data package arriving from one computer and sends the data to a specific computer - Router

2. This network device sends the data packet from computer to all devices connected to it - Hub

3. This network device connects a LAN to the Internet - Default Gateway

4. This network device connects one LAN to another with the same protocol - Router

Just noticed Router appeared twice. If they must be all different, please mention that in comment and I will think of a different name.

1. (+) Peter will be taken to the airport by his father tomorrow.
(-)………………………………………………………………….
(?)………………………………………………………………….

Answers

the figure shows cross-section of a ruler which is a rectangle of 2. 5 cm by 0.2 cm on which surmounted an isosceles trapezium (one in which the non- parallel sides area of equal length). the shorter of the parallel sides of the trapezium 0.7 cm long.if the greatest height of the ruler is 0. 4 cm and it is 33 cm long,calculate its surface area

Can someone give me a simple topic for a website please be creative make it simple! and fun for brainliest

Answers

Answer:

hmm you could talk about your dailylife , or stuff you like to do etc do what you like <3 , if you like art you could do that to!

Explanation:

Can someone give me a simple topic for a website? please be creative make it simple! and fun for brainliest

Write a java program to input a number from the user and tell if that number is a power of 2 or not.
Powers of 2 are 1, 2, 4, 8, 16, 32, 64, 128, 256 and so on.

Answers

Answer:

 public static boolean isPowerOfTwo(int n) {

   long exp = Math.round(Math.log(n) / Math.log(2));

   return Math.pow(2, exp) == n;

 }

Explanation:

The opposite of power-of-2 is the 2-log, which is calculated using any log divided by log(2).

I'm sure you can do the input part yourself!

Which variable data type is used to store a number that contains a decimal?

Question 3 options:

String


Integer


Boolean


Floating Point

Answers

Answer:

Floating Point

Explanation:

Also know as "real" or just "float".

Define a SCHEME function, unzip, which takes a list of pairs ((a .b)... (an .bn)) and returns a pair consisting of the two lists (a ...an) and (b. ... bn).

Answers

A scheme function can simply be defined as a programming language which allows us to build our own proce- dures and add them to the set of existing ones

However too, function call is given by as fa-rgs

Where, f is the name of the function and args a space-separated sequence of arguments

What is scheme?

It simply refers to an orderly large-scale plan or systematic arrangement for attaining a particular object or putting a particular idea into effect

So therefore, a scheme function can simply be defined as a programming language which allows us to build our own procedures and add them to the set of existing ones

Learn more about exponential scheme function:

https://brainly.com/question/11464095

reference of generation of computers?​

Answers

Answer:

First Generation: Vacuum Tubes. Second Generation: Transistors. Third Generation: Integrated Circuits. Fourth Generation: Microprocessors. Fifth Generation: Artificial Intelligence

Because law enforcement cannot be everywhere at once, what kind of intelligence should be focused on in order to avoid potential cyber
threats?
А. preventative
B. international
c. democratic
D. top-secret

Answers

B. International. I just took the test.

explain briefly the use of computers in the education​

Answers

Answer:

it helps us in learning new words and also improve our vocabulary skills and even in games like using Mavis beacon

In order to use a data type, a variable must be _____________________ and _____________________.

memorized and initialized
declared and initialized
assigned and memorized
noted and declared

Answers

Answer:

declared and initialized

Explanation:

:))

define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change the number of branches and size
then make on that does not use the pinwheel function to draw it

Answers

Start with your draw_pinwheel() function

During each iteration of the loop decide which color to set the turtle to using the color() function

On even iterations, use color1

On odd iterations, use color2

Use an if/else statement to do the decision making

After deciding the color, surround a call to draw_triangle() with begin_fill() and end_fill() so that drawing the triangle creates a colored triangle.

If you have have forgotten, you can use an if/else to check for even/oddness in python as follows.

my_number = 3

if(my_number % 2 == 0):     # the remainder of dividing by 2 is 0

   print("The number is "+str(my_number))

   print("The number is EVEN")

else:                       # the remainder must be 1

   print("The number is "+str(my_number))

   print("The number is ODD")

Good luck <3

Which factor affects reading speed the most?
a.
The desire to improve speed
c.
The motivation to practice
b.
The willing to try new techniques
d.
These are all equal factors


Please select the best answer from the choices provided

A
B
C
D
Mark this and return

Answers

D of course because each one of them affects reading speed equally.

Answer:

D. these are all equal factors

Explanation:

i took the test lads

Write a console application that requests the user to enter the name of their Pet and the year their pet was born.Calculate the age of the pet and display the name and age of the pet.

Answers

The console application that requests the user to enter the name of their Pet and the year their pet was born and calculate its age is as follows:

from datetime import date

def nameAndAge(x, y):

   today = date.today()

   age = today.year - y.year - ((today.month, today.day) < (y.month, y.day))

   return f"The name of your pet is {x} and the age is {age}"

   

# Driver code

print(nameAndAge("mike", date(1997, 2, 3)), "years")

Code explanation

The code is written in python.

we have to import date from datetime module.We declared a function named  "nameAndAge". The arguments of the function are the users input which are the name and date of birth of the pet.We store todays date in the variable called "today".Then we calculate the age of the pet.The next line of code, we returned the name and the age of the pet base on the users input.Finally, we call the function with the print statement.

learn more on python here: https://brainly.com/question/25285677

Cybercrime
Select 3 options.
is always intentional
O is always unintentional
O can be committed by an outsider
can be committed by an insider
O can be caused by negligence
help me please!?!

Answers

Answer:

O can be committed by an outsider

O can be committed by an insider

O can be caused by negligence

Explanation:

Cybercrime can be done by someone within the company and has access but it can also be done by someone outside through hacking.  Sometime someone broke the law without knowing it because of negligence.

What happens if we play talking Angela at 3 am​

Answers

maybe angela will talk to you

Explanation:

other people say it

Which of the following is a field whose value uniquely identifies each record in a
table?
Main key
Value key
Primary key
Element key

Answers

A field whose value uniquely identifies each record in a table is called: C. Primary key.

What is DBMS?

DBMS is an acronym for database management system and it can be defined as a collection of software applications that enables computer users to create, store, modify, retrieve and manage data or information in a relational database.

This ultimately implies that, DBMS allow end users to efficiently store, retrieve and manage their data with an appropriate level of security.

In database management system (DBMS), a primary key is a field whose value uniquely identifies each record in a table or relational database.

Read more on primary key here: https://brainly.com/question/8131854

large and fast disks should be used for as doing so will ensure work is done as quickly as possible?

Answers

Answer:  Well it depends, sometimes for a hard drive if you are using for an example, that would not really affect the performance on how big is it. But I think that it could impact the performance in a good way but maybe some people think that it's not so....

Explanation:

Well, that varies. For instance, depending on how big the hard disk is, performance may or may not be affected. However, I believe it could have a positive effect on performance, while perhaps others disagree.

What is the performance?

A play, concert, or another type of entertainment is staged or presented as a performance. It can also be described as the process or action of doing or completing a deed, task, or function. A qualitative methodology is known as "performance research" uses

The subject and method of the experiencing body are placed in time, place, and history. Instead of abstract or reductive encounters, the performance paradigm calls for a more direct experience, primarily through facework. For instance, depending on how big the hard disk is, performance may or may not be affected. However, I believe it could have a positive effect on performance, while perhaps others disagree.

Therefore, Well, that varies. For instance, depending on how big the hard disk is, performance

Learn more about performance here:

https://brainly.com/question/15466511

#SPJ2

Which would be considered a peripheral device?

A. a printer that can be connected from outside the computer to communicate with it

B. a CPU

C. RAM

D. an internal hardware part like a motherboard or hard drive

Answers

Answer:

D is the correct answer of this question

what is a window with controls that you tell window what you want

Answers

Answer:

dialog box

I hope this helps you

:)

the information of an management information system comes from?

Answers

A management information system is a computer system consisting of hardware and software that serves as the backbone of an organization's operations

A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?

Answers

Answer:

THEY SHOULD ADD CHEESE!

Explanation:

cheese solves everything,

Other Questions
What terms describes how we determine the goodness or evil of what we do or how we behave in situations? I need help rq!!?!??? The biological levels of organization range from a single cell all the way up to the biosphere in a highly structured hierarchy. The biological hierarchy includes: cells, tissues, Organs, organ systems, and organisms. Consider each of the pairs shown below select all that correctly paired the level with an appropriate example.A) organ: heartB) cell: neuronC) tissue: bloodD) organ: muscleE) organ system: small & large intestines, stomach, pancreas, gall bladder Argument against the New Jersey plan Select the correct text in the passage.Josh is an active toddler performing several activities every day. Through which of these activities is Josh learning?Josh enjoys playing with his rubber duck in the bathtub. In the afternoon, he takes a nap. When he plays with his toys, he likes to build blocks.At meal times, he enjoys eating soft mashed solids. Leia wants to buy a jacket that is $45.00. It's onsale for 22% off. How much will Leia be paying forthe jacket? Please Help me out!What is the measure of angle C? The principal at miller street school has 12 packs of new pencils How can the internet help you in purchasing clothing Write letter to your friend asking him/her to return your book. How much sales tax would you pay on a bike that costs $225 and sales tax is 5.3%? A catering company provides packages for weddings and for showers. The cost per person for small groupsis approximately Normally distributed for both weddings and showers. The mean cost for weddings is $82.30with a standard deviation of $18.20, while the mean cost for showers is $65 with a standard deviation of$17.73. If 9 weddings and 6 showers are randomly selected, what is the probability the mean cost of theweddings is more than the mean cost of the showers?O 0.0022O 0.0335O 0.9665O 0.9978 Please help I dont understand these problems Complete the sentence. are filters between the internet and a computer network. Find the equation of a circle whose center is at (2, 3) and radius is 6. Help Identify a conflict in chapter 15 you read and explain how the conflict impacts the character. Use text evidence to support your response in best that is that is the book hey everyone can you help me sort out this problem, answer is 10 How did the Mexican Revolution impact other countries in Latin America? Ron has a family history of high blood pressure. He has studied the causes, signs, and possible outcomes of the disease. What kind of strategy has he used to improve his health? A. He has found immediate and cumulative risks. B. He has set long-term and short-term goals. C. He has incorporated risk reduction into his life. D. He has increased his knowledge. the president appointed me to my job. the Senate approve my appointment and that of others like me. I an called a secretary. I advise the president on something specific, such as education, defense, or agriculture. I serve only as long as the president wants me to serve. What am i?