Discover a wealth of knowledge at Westonci.ca, where experts provide answers to your most pressing questions. Experience the ease of finding accurate answers to your questions from a knowledgeable community of professionals. Connect with a community of professionals ready to help you find accurate solutions to your questions quickly and efficiently.
Sagot :
Answer:
A, B and E
Explanation:
Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.
Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.
Option C is not correct as it is simply not possible.
Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.
Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).
Hope this helps!
Thank you for your visit. We're dedicated to helping you find the information you need, whenever you need it. We appreciate your time. Please come back anytime for the latest information and answers to your questions. Westonci.ca is here to provide the answers you seek. Return often for more expert solutions.