..
This page lists questions and answers that were posted by visitors named ...
Questions
The following questions were asked by visitors named ...
Part 2: Check Register Practice Scenario: You opened a checking account with $500. Record the following transactions: 1. Deposit: $200 (Paycheck) 2. Check #101: $75 (Groceries) 3. Debit Card Purchase: $25 (Gas) 4. ATM Withdrawal: $40 5. Deposit: $100 (Bir...
3 months ago
What can I add to my cv on what I've learned in teaching grade R
3 months ago
Residents in Conyers, Georgia, woke up to 27 degrees weather. Ms. Ausby had to let Snoopy outside to go potty. When she opened the patio door, she immediately realized just how cold it was outside. Explain if the cold air from outside entered the house, o...
3 months ago
Bank Account Match-Up Worksheet Instructions: Match each account type with the correct real-life scenario. Then, complete the extra practice section by calculating balances after transactions. Account Types Checking Account Savings Account Certificate of...
3 months ago
What are the different types of bank accounts and how do they work? How can you use excel to keep track of my money in a bank account?
3 months ago
mini summary -Common bank-account types: checking/current, savings, money market, certificates of deposit (CDs)/time deposits, retirement accounts (IRAs/401(k) custodial), brokerage/cash accounts, business accounts, joint/trust/custodial, and prepaid/virt...
3 months ago
What are the different types of bank accounts and how do they work?
3 months ago
How can you use excel to keep track of my money in a bank account?
3 months ago
Explain the assignment in your own words Do I understand the basic vocabulary of the assignment? What is it asking me to do (in my own words)? Is my purpose for writing specified in the assignment? Does the assignment ask me to use specific types of evide...
3 months ago
a. Choose the correct scatter plot. A. Your answer is correct.B. C. D. Part 2 b. The outlier(s) is(are) 5 comma. (Type an ordered pair, using integers or decimals. Do not include the $ symbol in your answer. Use a comma to separate answers as needed....
3 months ago
On rare occasions, an individual computer contains information that is highly confidential and must remain separated from both internal and external networks. Which of the following segmentation solutions would BEST achieve this goal? answer Jumpbox VLAN...
3 months ago
What does a router use to protect a network from attacks and to control which types of communications are allowed on a network? answer Hardware root of trust Access control list Air gap Screened subnet
3 months ago
Which of the following analysis methods involves looking at data over a period of time and then uses those patterns to make predictions about future events? answer Trend Signature detection Anomaly-based Heuristic
3 months ago
Which of the following statements are true when describing Heuristic analysis? (Select two.) answer Requires little human interaction. Analyzes data over a period of time to establish patterns. Looks at frequency, volume, and statistical deviations data....
3 months ago
Which IDS method searches for intrusion or attack attempts by recognizing patterns or identifying entities listed in a database? answer Heuristics-based IDS Signature-based IDS Anomaly-analysis-based IDS Stateful-inspection-based IDS
3 months ago
The network IDS has sent alerts regarding malformed messages and sequencing errors. Which of the following IDS detection methods is MOST likely being used? answer Trend Signature Protocol Anomaly
3 months ago
The outlier(s) is(are) left parenthesis 5 comma 37.50 right parenthesis. (Type an ordered pair, using integers or decimals. Do not include the $ symbol in your answer. Use a comma to separate answers as needed.) Part 3 What situation might have cause...
3 months ago
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations? answer Switch IDS Firewall Padded cell
3 months ago
You are the security analyst for your organization. During a vulnerability analysis, you have noticed the following: File attributes being altered Unknown .ozd files Files that do not match the existing naming scheme Changes to the log files Which of the...
3 months ago
An attacker is disguising a signature by encoding the attack payload and placing a decoder in front of the payload. Every time the payload is sent, the code is rewritten so the signature changes. Which of the following obfuscation techniques is the attack...
3 months ago
When it comes to obfuscation mechanisms, nmap has the ability to generate decoys, meaning that detection of the actual scanning system becomes much more difficult. Which of the following is the proper nmap command used to generate decoys? answer nmap -S R...
3 months ago
The scatter plot represents the number of hours since a city parking lot opened on different days and the number of cars in the parking lot. a. Identify any outliers in the scatter plot. b. Identify any clusters in the scatter plot. c. Identify any gaps i...
3 months ago
The scatter plot represents the number of hours since a city parking lot opened on different days and the number of cars in the parking lot. a. Identify any outliers in the scatter plot. b. Identify any clusters in the scatter plot. c. Identify any gaps i...
3 months ago
How do dashes change sentence meaning? Think about how they can add emphasis or create pauses.
3 months ago
Hiking The scatter plot shows a hiker's elevation above sea level during a hike from the base to the top of a mountain. The equation of a trend line for the hiker's elevation is yequals9.35xplus691, where x represents the number of minutes and y repres...
3 months ago
Read the passage and answer the following question(s). More Americans Are Waiting to Drive by Susan Milligan 1 American pop-culture history is filled with romantic references to cars. They’re celebrated in songs and movies, with young people eager to acqu...
3 months ago
Read these sentences from paragraph 2. Teens and twenty-somethings are delaying driver’s license’s, buying fewer cars, and covering fewer kilometers when they drive. And the cool factor? It’s not what it used to be. What does the author mean by the words...
3 months ago
by Susan Milligan 1 American pop-culture history is filled with romantic references to cars. They’re celebrated in songs and movies, with young people eager to acquire the symbol of adulthood, freedom, and overall coolness. But for increasing numbers of t...
3 months ago
(1) Before I visited the national park that encompasses parts of Tennessee and North Carolina last summer, had I no idea why the Great Smoky Mountains were given their name? (2) On my first day in the forest, however, I stood high on an overlook and gazed...
3 months ago
HYALEI: Okay, point taken. People have a lot of fun at this thing and you’re winning all the competitions. What is another way of saying the sentence, “Okay, point taken”? A. “Your score is now higher.” B. “I take what you say as serious.” C. “That is jus...
3 months ago
For which of these pairs of variables might it be possible to draw a straight line on a scatter plot to model the relationship between the variables? Select three that apply. A. time and distance B. weight and height C. age and gender D. length and width
3 months ago
The scatterplot below shows the relationship between Algebra I final exam scores and Physics final exam scores. A scatter plot is shown with data points showing a strong positive relationship. The x-values of the data points extend from 60 to 100, and the...
3 months ago
Is the line a good fit for the data points plotted in the scatter plot below? The scatter plot in the first quadrant of the coordinate plane showing 8 data points equally distributed on the either sides of a line passing through (0, 1), (2, 3), ((3, 4), (...
3 months ago
Which of the following lines would be the best fit for the data points plotted in the scatter plot below? The scatter plot on graph showing the points (1, 7), (2, 6), (3, 5), (4, 3), (5, 4), (6, 2), (6, 3), (7, 3), (8, 1), and (8, 2). A. y = − 7 . 2 x + 0...
3 months ago
Which of the following lines would be the best fit for the data points plotted in the scatter plot below? The scatter plot on graph showing the points (1, 4), (2, 5), (3, 4), (4, 6), (5, 5), (6, 6), (6, 8), (7, 7), (8, 7), and (8, 8). A. y = 0 . 5 x − 3 ....
3 months ago
Tony created a scatter plot representing the relationship between the number of hours a student spent watching TV the day before a quiz and the grade the student earned on the quiz. image Which statement most accurately represents his scatter plot? A. A l...
3 months ago
A principal measures the weight of different numbers of textbooks that he finds in a storage room. The scatter plot below shows the relationship between the weight, in pounds, and the number of textbooks. A line of best fit is drawn on the scatter plot. A...
3 months ago
A worker at an orchard measures the mass of different numbers of apples. The scatter plot below shows the relationship between the mass, in kilograms, and the number of apples. The scatter plot shows 19 data points and a line passing through (0, 0), (5, 0...
3 months ago
a ferris wheel has a radius of 10m and is one meter above the ground. If the ferris wheel makes 1 revolution every 20 seconds, write an equation that gives the height above the ground of a person on the ferris wheel as a function of time if that person st...
3 months ago
1. What is the main difference between debit and credit cards?
3 months ago
2. How does each type affect your bank account or credit score?
3 months ago
Which of the following BEST describes the purpose of the wireless attack type known as wardriving? answer To block a company's authorized wireless communications using radio noise or signals. To find information that will help breach a victim's wireless n...
3 months ago
You have just discovered that a hacker is trying to penetrate your network using MAC spoofing. Which of the following BEST describes MAC spoofing? answer Changing a hacker's network card to match a legitimate address being used on a network. Configuring a...
3 months ago
Which of the following BEST describes a rogue access point attack? answer A hacker taking advantage of an access point that has not implemented the basic techniques to protect the network. A hacker getting a user or client to unintentionally connect to th...
3 months ago
Which Wi-Fi attack uses a rogue access point configured with the same SSID as the organization's SSID? answer Evil twin MAC spoofing Access point misconfiguration Wardriving
3 months ago
Which of the following are the BEST methods for protecting against rogue devices and identifying rogue devices more easily? (Select two.) answer Network mapping and host discovery 802.1x network access control Traffic flow Port-based access control Packet...
3 months ago
A company's security analyst wants to identify issues such as unauthorized devices and software or misconfigured hosts on the company network. Which of the following are the most commonly used methods for detecting any rogue devices on a network? (Select...
3 months ago
A company's security team recently discovered an unknown device connected to their network, and they suspect it could be a rogue device. The team wants to conduct scans and sweeps to locate and remove any unauthorized devices on the network. Which of the...
3 months ago
A company has recently discovered that its network has become slow and unreliable, with frequent outages and disruptions. An IT staff member suspects that rogue devices on the network could be causing these issues. What are the BEST ways to identify rogue...
3 months ago
An analyst reviews an alert detecting a rogue backend server being deployed behind the company's load balancer. The analyst attempts multiple map scans in hopes of identifying the possible threat but fails to reach the destination. What problem is present...
3 months ago
What relationship do you see between the amount of time spent studying and the test scores? Is the relationship linear? Lesson 4-1 𝖠 In general, Adam scores higher on a test when he spends more time studying. There is not a linear relationship. 𝖡 In gener...
3 months ago
irections: Use the WORD BANK below to organize the jobs and duties of the three branches of government below. Each word will only be used once. Veto Laws Enforces Laws Makes Laws LT. Governor General Assembly Legislator Interprets Laws Senate Bi -Cameral...
3 months ago
4. What happens if your debit or credit card is stolen?
3 months ago
5. List two advantages of using a debit card:
3 months ago
6. List two advantages of using a credit card:
3 months ago
7. What are some drawbacks of using debit cards?
3 months ago
8. What are some drawbacks of using credit cards?
3 months ago
9. When would using a credit card be a better choice than debit?
3 months ago
10. What could happen if you only pay the minimum balance on a credit card?
3 months ago
11. How might teens begin building credit responsibly before getting their first card?
3 months ago
A security analyst is monitoring the network traffic of a large organization. The analyst has noticed an unusual spike in network traffic and needs to determine the cause. What is the MOST likely explanation for the unusual spike in network traffic? answe...
3 months ago
A customer logs into their bank account and simultaneously checks their email. They see an email containing a link that, when clicked, initiates a transfer of funds from the user's bank account to an attacker's account. What type of vulnerability does thi...
3 months ago
Which of the following BEST describes the countermeasures you would take against a cross-site request forgery attack? answer Set the secure flag on all sensitive cookies. Ensure that certificates are valid and are not expired. All non-SSL web page request...
3 months ago
A security administrator is testing their organization's database server, which services a publicly accessible web application server. The security administrator sends unexpected input combined with arbitrary commands to the web application to determine w...
3 months ago
A monster truck forum permit users to upload URLs of their favorite monster truck videos for their friends to view. An attacker submits a specially crafted URL that includes a call for the forum's internal network resources, and the web application proces...
3 months ago
Which of the following types of attacks involves constructing malicious commands with the goal of modifying a database? answer Directory traversal Overflow attack DDoS SQL injection
3 months ago
An artificial intelligence research corporation has tasked a cybersecurity analyst with preventing malicious or corrupted data from entering into their proprietary ML model through a data poisoning attack. Which of the following actions should the analyst...
3 months ago
There are several types of signature evasion techniques. Which of the following BEST describes the obfuscated code technique? answer Can be used to represent a SQL query Inserts in-line comments between SQL keywords Is a SQL statement that is hard to read...
3 months ago
As a security analyst, you want to evade an IDS system while testing for SQL injection vulnerabilities. Which of the following actions will help you avoid getting compromised answer Limit the number of MAC addresses a switch port can learn and accept. Use...
3 months ago
A security analyst is testing to find SQL injection vulnerabilities. She uses automation of a large volume of random data inserted into the web application's input fields in order to check the output. Which type of testing was done? answer Static testing...
3 months ago
A web form with a User ID input field, submit button, and error information The field in the image below is supposed to return just the username associated with the user ID (a number). The output in the image, however, includes more information, including...
3 months ago
You have performed a SQL injection attack against a website using Burp Suite and see the following results. What are you looking for? Any results that have a large length Any results that show the server returning an error Any results that show the userna...
3 months ago
Which of the following cyberattacks involves an attacker inserting their own code through a data entry point created for regular users in such a way that the server accepts the malicious code as legitimate? answer DoS ARP poisoning Session hijacking SQL i...
3 months ago
Which of the following BEST describes a relational database? answer A storage bank for data in which data is organized in a tree-type format and ranked based on how many links a record has. A storage bank for data in which data is stored in a format like...
3 months ago
Which of the following SQL injection attack types uses true/false questions to perform reconnaissance? answer Authentication bypass attack Compromised data integrity attack Compromised availability of data attack Blind injection attack
3 months ago
Describe the relationship between the data in the scatter plot
3 months ago
A company assigns a security analyst to monitor the network traffic and identify any potential security breaches. The analyst is debating between using Wireshark or tcpdump to analyze the network packets for unusual network activity. Which of the followin...
3 months ago
You are reviewing packets captured by a co-worker. The traffic is from a Linux server that hosts private customer data, and your job is to analyze the content for potential security risks. The .pcap file appears to be a bit small for what you wanted. (It...
3 months ago
After a sniffing attack has been discovered on an organization's large network, Jim, a security analyst, has been asked to take steps to secure the network from future attacks. The organization has multiple buildings and departments. Which of the followin...
3 months ago
You configure your switches to shut down a port immediately after it being accessed by an unauthorized user. Which type of attack are you trying to prevent? answer Rootkits Sniffing Ransomware Trojans
3 months ago
There is strong evidence that a machine is compromised on your company network, but you have not determined which computer. You are going to try to pinpoint the host by scanning for any network devices that are in promiscuous mode. Which of the following...
3 months ago
Which of the scenarios below might justify using a MAC address spoofing tool when connecting to your company's network? (Select two.) answer A new web server that is for internal-only use has a firewall that only allows a list of six devices to access res...
3 months ago
The IT director has requested that you verify that traffic to a new server from her machine goes only where it is supposed to and can't be redirected to another IP address. You decide to attempt to manipulate traffic on the network to see if things are re...
3 months ago
The IT director has requested that you verify that traffic to a new server from her machine goes only where it is supposed to and can't be redirected to another IP address. You decide to attempt to manipulate traffic on the network to see if things are re...
3 months ago
Which of the following is the term used to describe what happens when an attacker sends falsified messages to link their MAC address with the IP address of a legitimate computer or server on a network? answer MAC flooding MAC spoofing Port mirroring ARP p...
3 months ago
Part 1 of 2 Question content area top Part 1 The scatter plot shows Leanna's elevation above sea level during a hike. The trend line passes through the points left parenthesis 30 comma 1070 right parenthesis and left parenthesis 75 comma 1680 right paren...
3 months ago
The scatter plot shows Leanna's elevation above sea level during a hike. The trend line passes through the points left parenthesis 30 comma 1070 right parenthesis and left parenthesis 75 comma 1680 right parenthesis. If Leanna starts at 663 feet above se...
3 months ago
An arctic cold front is moving through an area. It is 37degreesF when the temperature begins to drop. The scatter plot suggests a linear relationship between the temperature and the number of hours since the cold front arrived. Use the scatter plot to ans...
3 months ago
An arctic cold front is moving through an area. It is 37degreesF when the temperature begins to drop. The scatter plot suggests a linear relationship between the temperature and the number of hours since the cold front arrived. Use the scatter plot to ans...
3 months ago
The scatter plot shows the number of passengers at a major airport over a 15-year period from the year 2000. About how many passengers traveled through this airport in the year 2011? LOADING... Click the icon to view the scatter plot. Question content a...
3 months ago
art 2 of 2 Question content area top Part 1 The graph shows the population y of a certain city over the course of 10 years x. The equation of the trend line shown is yequals1.9xplus21. Answer parts a and b. LOADING... Click the icon to view the scatter pl...
3 months ago
Part 1 of 2 Question content area top Part 1 The graph shows Maria's distance from her house during the first hour of her drive home from the beach. The trend line passes through the points left parenthesis 0 comma 94 right parenthesis and left parenthes...
3 months ago
Question content area top Part 1 The graph shows Maria's distance from her house during the first hour of her drive home from the beach. The trend line passes through the points left parenthesis 0 comma 94 right parenthesis and left parenthesis 30 comma...
3 months ago
Give me something nice to say about this girl her name is jalycia it’s thanksgiving and im thankful for her make it nice and sweet keep it kinda short i love her so much
3 months ago
Hey Kinsey, I just want to say that I’ve been feeling a little off the past few days, and I’m really sorry if that affected you in any way. I’ve been processing some emotions, but I’m in a better place now. I love you so much, and it’s important to me tha...
3 months ago
If im being honest most of the time u say something that upsets me its honestly a personal thing so im telling u now if u say something and i get mad in the moment dont worry abt it ill be fine unless its rlly disrespectful u dont need to be uncomfortable...
3 months ago
A password spraying attack is MOST like which of the following attack types? answer A privilege escalation attack A brute force attack A phishing attack A directory traversal attack
2 months ago
Over time, changes in the way people use networks have complicated protecting a network against security threats. Which of the following trends has increased the need for security? (Select two.) answer Social networking Cloud computing Multi-factor authen...
2 months ago
Your company has had a problem with users getting hacked even though you have established strong password policies. What is the next logical step to increase your company's security? answer Train the employees on the different types of hackers. Purchase n...
2 months ago
You are looking through your network usage logs and notice logins from a variety of geographic locations that are far from where your employees usually log in. Could this be a problem and why? answer No. Logins from strange geographical locations often ha...
2 months ago
Answers
The following answers were posted by visitors named ...