English, asked by jyothidayakar95, 2 months ago

• While exploring your file server path, in the internal network, you find that you have access to a
folder of another Infoscion. This folder has a scanned copy of his passport, his salary statements,
etc. apart from his project documents. Which is the appropriate action that you should be taking?
Qa. You assume that you are authorized to access this folder So you may not only, browse the
contents but also share them with herdou kanth
b. You assume that you are authorized to access the folder So you may browse the contents,
save them onto your machine for your leference Boulbot share them with others.
c. Immediately report this vulnerability to be
d. Do not access the contents and mine hatever the concerned Infoscion so that the
unauthorized access can be revoked​

Answers

Answered by pankami680
12

Answer:

Immediately report this vulnerability to be

d. Do not access the contents and mine hatever the concerned Infoscion so that the

unauthorized access can be revoked

Answered by tushargupta0691
0

Answer:

option d

Explanation:

  • The Winfile file is located in the system32 directory under %systemroot%. Navigate to the desired file (even across a network share). To display the file's properties, press Alt+Enter. To find out who has the file open, click Open by.
  • The ideal method for accessing a network disc is over a VPN. The IP address of the distant machine can be entered in the search field to access a mapped network disc from outside your network. If the disc is correctly mapped, a window displaying the shared information ought to appear.
  • The ideal way for businesses to access data from a distance is to set up a virtual private network (VPN). A VPN establishes an Internet connection that resembles a cable between a distant PC and the server at your place of business.

This folder has a scanned copy of his passport, his salary statements, etc. apart from his project documents  Do not access the contents and mine hatever the concerned Infoscion so that the unauthorized access can be revoked​.

#SPJ2

Similar questions