Find trusted answers to your questions with the help of IDNLearn.com's knowledgeable community. Find reliable solutions to your questions quickly and easily with help from our experienced experts.
Sagot :
Answer:
A, B and E
Explanation:
Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.
Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.
Option C is not correct as it is simply not possible.
Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.
Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).
Hope this helps!
We are delighted to have you as part of our community. Keep asking, answering, and sharing your insights. Together, we can create a valuable knowledge resource. IDNLearn.com provides the answers you need. Thank you for visiting, and see you next time for more valuable insights.