Westonci.ca connects you with experts who provide insightful answers to your questions. Join us today and start learning! Connect with a community of experts ready to help you find accurate solutions to your questions quickly and efficiently. Get detailed and accurate answers to your questions from a dedicated community of experts on our Q&A platform.
Sagot :
Answer:
A, B and E
Explanation:
Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.
Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.
Option C is not correct as it is simply not possible.
Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.
Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).
Hope this helps!
Thanks for stopping by. We are committed to providing the best answers for all your questions. See you again soon. We appreciate your time. Please revisit us for more reliable answers to any questions you may have. We're glad you visited Westonci.ca. Return anytime for updated answers from our knowledgeable team.