as the it security specialist for your company, you are performing a penetration test to verify the security of the accounting department. you are concerned that invoice emails can be captured and the information gleaned from these emails can be used to help hackers generate fake invoice requests. in this lab, your task is to:

Answers

Answer 1

As an IT security specialist, it is crucial to ensure that the accounting department's information and invoice emails are secure and not vulnerable to unauthorized access or manipulation. In this scenario, we are performing a penetration test to verify the security of the accounting department and assess the risks associated with invoice emails being captured by hackers.

To perform this penetration test, follow these steps:

Gather information about the company's email system, network infrastructure, and accounting department systems to understand the target environment.Identify potential vulnerabilities, such as weak encryption methods, inadequate password policies, or outdated software, that might be exploited by hackers to gain access to invoice emails.Develop a plan to simulate a real-world attack, aiming to capture or intercept invoice emails without being detected. This might involve using social engineering tactics, exploiting software vulnerabilities, or manipulating network traffic.Execute the simulated attack and attempt to gain access to invoice emails or other sensitive information within the accounting department's systems. Document any successful breaches, including the techniques used and the information obtained.Analyze the results of the penetration test, identifying the weaknesses in the company's security measures that allowed the simulated attack to succeed.

After completing the penetration test, it is important to communicate the findings and recommendations to the relevant stakeholders. This may include suggesting improvements to the email system's security, implementing stronger encryption methods, and reinforcing employee security awareness training. By addressing the identified vulnerabilities, the company can significantly reduce the risk of invoice email interception and protect the accounting department from potential attacks.

To learn more about IT security, visit:

https://brainly.com/question/29796699

#SPJ11


Related Questions

After a new technology is purchased, what are some additional cost that must be incorporated into an upgrade budget.

Answers

Answer:

everything

Explanation:

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

help please, on tuesday we have oral presentation in zoom and i am afraid to speak in front of people, and i don't know what to do, nobody wants to help me and the teacher does not answer me, so i can't ask him if i can make the exposition in private :(
i can't ask for help to my friends because they ignore me, and my family will be mad at me if they know this
sorry if my english is bad.

Answers

Answer:

You should be strong, and be sure about what you want to say. Make sure when you speak it is clear, and makes sense.

Explanation:

If you don't speak up or sound like you know what you are talking about. I like to think of it as dancing. Act like you own the stage, or in your case, like you own the presentation. Also, I suggest you speak to your teacher in private, about him ignoring you. If I were you, I would look for newer friends. Ones that won't ignore you.

to answer the questions that follow, download an excel® spreadsheet containing the demographic data for a sample of 30 adults by clicking on the following words in bold:

Answers

BY opening excel and importing sheets containing data we can analyze excel sheet.


To analyze demographic data in Excel:
1. Open your Excel program and import the spreadsheet containing the demographic data for the sample of 30 adults.
2. Familiarize yourself with the data by examining the columns, which may include information such as age, gender, income, and other relevant demographic characteristics.
3. Use Excel's built-in tools to answer specific questions about the data. For example:
 - To calculate the average age of the sample, use the =AVERAGE() function by selecting the range of cells containing the age data.
 - To determine the percentage of males and females in the sample, use the =COUNTIF() function for each gender, and then divide by the total number of adults in the sample.
4. You can also create charts and graphs to visualize the data more effectively. Select the data you want to analyze, click on the 'Insert' tab, and choose the appropriate chart type (such as pie chart or bar graph) to display the data.
5. Depending on the questions you need to answer, you may need to use additional functions and tools in Excel, such as sorting and filtering, to further analyze and interpret the demographic data.
Remember to always double-check your formulas and data to ensure accuracy in your analysis.

Learn more about Excel:https://brainly.com/question/29280920

#SPJ11

A system operating with a low superheat and a low subcooling most likely has:
An over feeding refrigerant metering device

Answers

A system operating with a low superheat and a low subcooling most likely has an overfeeding refrigerant metering device.

This is the main answer. Here's an A refrigeration system that is operating with a low superheat and a low subcooling likely has an overfeeding refrigerant metering device. This is because an overfeeding refrigerant metering device is responsible for the additional refrigerant that is delivered to the evaporator.

Therefore, the term to complete the answer is "overfeeding refrigerant metering device." It is important to note that the superheat and subcooling are related to the refrigerant charge, as well as the metering device. If the metering device is not functioning correctly, the refrigerant may not be distributed properly, causing low superheat and subcooling values to occur.

To know more about refrigeration visit:

https://brainly.com/question/33631335

#SPJ11

How ICT has helped education to grow through progression?

Answers

Answer:

Hey there!

Explanation:

This is ur answer...

ICTs can enhance the quality of education in several ways: by increasing learner motivation and engagement, by facilitating the acquisition of basic skills, and by enhancing teacher training. ICTs are also transformational tools which, when used appropriately, can promote the shift to a learner-centered environment.

Hope it helps!

Brainliest pls!

Have a good day!^^

There are many reasons why interpersonal communications may fail. While communicating, the message may not be received exactly the way the sender intended and therefore it is important that the communicator seeks to check that their message is clearly understood.
(a) Description
(b) Feedback
(c) Channel
(d) Sign ​

Answers

Answer:

a

Explanation:

description of the message to communicate

The information given illustrates feedback.

Feedback in communication simply means the response of the audience. It should be noted that feedback is important in order to know the effectiveness of one's message.

In a situation where the message may not be received exactly the way the sender intended, this implies that the feedback has been affected in this situation.

Read related link on:

https://brainly.com/question/25709466

Lee can hold a phone up to a museum exhibit and, on the screen, is more information about the exhibit overlaid on top of a picture of the exhibit. What is this program called?

Answers

Answer:

Augmented reality

Explanation:

augmented reality because I was doing a test looked at the answers and this answer didn’t make since so I looked up the definitions of all of them and it is augmented reality.

Eye of the Storm presents an example of:
A. news reporting combined with personal narrative.
B. citizens reporting the news better than journalists,
C. journalists reporting the news objectively.
D. news reporters who become a bigger story than the one they are reporting.
ANWER IS: A

Answers

Eye of the Storm presents an example of news reporting combined with a personal narrative. Thus, option A is correct.

Citizen journalism in the context of the reporter experiencing the activities of a massive storm alongside many others concerning which they wrote based on what they think and believe.

Journalism is the procedure through which a reporter verifies and tells a narrative to make a subject noteworthy. Narratives should be utilized sparingly in most news items and only when conveying a personal tale helps to explain the message of the piece.

Therefore, option A is correct.

Learn more about Narratives, here:

https://brainly.com/question/2134080

#SPJ1

Should tangshan mining company accept a new project if its maximum payback is 3. 5 years and its initial after-tax cost is r15 000 000 and it is expected to provide after-tax operating cash inflows of r5 400 000 in year 1, r5 700 000 in year 2, r2 100 000 in year 3 and r5 400 000 in year 4?.

Answers

Yes, Tangshan mining company should accept the new project.

Reason: According to the details in the question

Tangshan company's required payback period is 3.5 years

Year             CF                       Net CF

0              -5,000,000        -5,000,000

1                1,800,000          -3,200,000

2               1,900,000          -1,300,000

3                  700,000             -600,000

4                1,800,000           1,200,000

We know,
Payback period = last year with -net CF +(absolute net CF that year /total CF the following year)

Payback period = 3 + (600,000 / 1,800,000)

                           =3 + 0.33

                           = 3.33 years

Therefore, Tangshan Mining Company should ACCEPT the new project since 3.33 years is shorter than the statutory payback period of 3.5 years and it will take fewer years to fully return the initial expenditure.

Define the Payback period.

The length of time it takes to recoup the cost of an investment is referred to as the payback period. When discussing capital budgeting, the term "payback period" refers to the length of time needed to reach the break-even point or return the investment's costs. A two-year payback time, for instance, would apply to an investment of $1,000 made at the beginning of the first year that yielded $500 at the conclusion of the first and second years, respectively.

To learn more about the payback period, use the link given
https://brainly.com/question/25534287
#SPJ4

The three essential elements of the definition of a database are​ ________. A. ​tables; relationship among rows in​ tables; validation rulesB. ​tables; relationship among rows in​ tables; metadataC. Validation​ rules; data; tablesD. ​fields; relationship among fields in​ tables; metadataE. ​tables; metadata; validation rules

Answers

The three essential elements of the definition of a database are tables, relationship among rows in tables, and metadata. Tables are used to store data in the database, while the relationship among rows in tables is essential to establish connections between data.

Metadata refers to the data that describes other data, such as the structure of the database, the relationships between tables, and the data types and validation rules that are applied to the data. These three elements work together to create a system that allows for the efficient and effective management of data. Validation rules, fields, and other elements are important components of a database as well, but they are not considered essential elements of the definition.

Find out more about database

brainly.com/question/8966038

#SPJ4

classify the functions of dhcp and dns protocols​

classify the functions of dhcp and dns protocols

Answers

Answer:

Dynamic Host Configuration Protocol (DHCP) enables users to dynamically and transparently assign reusable IP addresses to clients. ... Domain Name System (DNS) is the system in the Internet that maps names of objects (usually host names) into IP numbers or other resource record values.

Ann wants to download Adobe Acrobat software from the Internet. Prior to downloading, a standardized online contract appears on the screen that requires her to click on an icon indicating agreement, before she can proceed in the program. Such contracts are called:

Answers

answer: terms and services

Which test is the best indicator of how well you will do on the ACT

Answers

Answer:

The correct answer to the following question will be "The Aspire test".

Explanation:

Aspire seems to be a highly valued technique or tool that would help parents and teachers take measurements toward another excellent 3rd-10th grade ACT assessment test.

The Aspire test measures academic achievement in five aspects addressed either by ACT quiz such as:

EnglishMathReadingScienceWriting.

So that the above is the right answer.

What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.​

Answers

Answer:

Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.

Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.

Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.

Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.

You are an administrator over several Windows servers. You also manage a domain in Active Directory. Your responsibilities include managing permissions and rights to make sure users can do their jobs while also keeping them from doing things they should not be doing.
With Windows Server systems and Active Directory, the concepts of permissions and rights are used to describe specific and different kinds of tasks.
Drag the concept on the left to the appropriate task examples on the right. (Each concept can be used more than once.)

Answers

The appropriate placement of the concepts with their corresponding task examples is:

Allow members of the Admins group to back up the files in the Marketing folder on the CorpFiles server = RightsAssign members of the Admins group read-only access to the files in the Marketing folder on the CorpFiles server = PermissionsAllow members of the Admins group to restore the files in the Marketing folder on the CorpFiles server = RightsAssign members of the Marketing group read-write access to the files in the Marketing folder on the CorpFiles server = PermissionsAllow members of the Admins group to log on locally to the CorpFiles server = RightsAllow members of the Admins group to shut down the CorpFiles server = RightsAllow members of the Marketing group to send print jobs to the Marketing color printer = Permissions

Permissions and rights are important concepts when managing user access to resources on Windows servers and Active Directory domains. Permissions are used to grant or deny access to specific files, folders, and other resources, while rights are used to assign specific privileges to users or groups, such as the ability to shut down a server or log on locally.

In this scenario, the administrator is granted rights to back up and restore files, as well as the ability to shut down the server and log on locally, while the Marketing group is given permissions to read and write files and send print jobs to a specific printer. By carefully managing permissions and rights, administrators can ensure that users have the access they need to perform their jobs while maintaining security and preventing unauthorized access or activity.

The complete question:

You are an administrator over several Windows servers. You also manage a domain in Active Directory. Your responsibilities include managing permissions and rights to make sure users can do their jobs while also keeping them from doing things they should not be doing. With Windows Server systems and Active Directory, the concepts of permissions and rights are used to describe specific and different kinds of tasks. Drag the concept on the left to the appropriate task examples on the right. (Each concept can be used more than once.)

Concept:

RightsPermission

Task examples:

Allow members of the Admins group to back up the files in the Marketing folder on the CorpFiles server Assign members of the Admins group read-only access to the files in the Marketing folder on the CorpFiles server Allow members of the Admins group to restore the files in the Marketing folder on the CorpFiles server Assign members of the Marketing group read-write access to the files in the Marketing folder on the CorpFiles serverAllow members of the Admins group to log on locally to the CorpFiles serverAllow members of the Admins group to shut down the CorpFiles server Allow members of the Marketing group to send print jobs to the Marketing color printer

Learn more about Windows servers https://brainly.com/question/30378924

#SPJ11

How do I fix the following error occurred attempting to join the domain?

Answers

Click System from the System and Security menu.Click Change settings under Computer name, network, and workgroup settings.Click Change on the Computer Name tab.Click Domain, write the domain name you want this machine to join, and afterwards click OK under Member of.

Why am I unable to connect my machine to the domain?

Check your permissions before adding machines to the domain.The Create computer objects permission in Directories must be granted to the user account in order to join a machine to the domain.Make sure the provided user account can log in locally to a client machine as well.

Can a domain be joined without DNS?

A DNS server that is set up correctly -Your workstation won't be capable of connecting to a domain if the DNS server is not set correctly.

To know more about domain visit:

https://brainly.com/question/28135761

#SPJ4

write an algorithm to calculate the simple interest using the formula​

Answers

Answer:

step 1:- start

step 2:-read principal amount, rate and time

step 3:- calculate interest using formula sI=((amount*rate*time)/100)

step 4:- print simple interest

step 5:- //CPP program to find compound interest for. //given values

Which of the following algorithms require both selection and iteration?
Select two answers.
(A) An algorithm that, given two integers, displays the greater of the two integers
(B) An algorithm that, given a list of integers, displays the number of even integers in the list
(C) An algorithm that, given a list of integers, displays only the negative integers in the list
(D) An algorithm that, given a list of integers, displays the sum of the integers in the list

Answers

(C) Algorithms A and B consistently determine the right average. (D) Neither Algorithm A nor Algorithm B determine the accurate average.

Sequencing, selection, and iteration can be combined to create any algorithm. Sequencing: Applying each algorithmic step in the order that the code statements are provided. Selection: Depending on whether a condition is true or not, selection chooses which steps of an algorithm to execute.Algorithms frequently utilise repetition to carry out actions a predetermined number of times or up until a predetermined condition is reached. We have developed an algorithm for Pig Latin translation that successfully combines sequencing, selection, and iteration.The order in which instructions are received and processed is known as the sequence. The path a programme takes while running is determined by selection. When a programme is running, iteration refers to the repeating execution of a block of code.

To learn more about   determine  click on the link below:

brainly.com/question/29898039

#SPJ11


All markup languages follow web programming standards. These standards are defined by the

Answers

The World Wide Web Consortium is the primary entity in charge of developing and upholding web standards (W3C). Numerous standards, including the common markup languages we use to create webpages, have been established by the W3C.

Who sets the standards for web programming?

The W3C is the most well-known organization for setting web standards, but there are others as well, including the WHATWG (which oversees the HTML language's living standards), ECMA (which publishes the standard for ECMAScript, on which JavaScript is based), Khronos (which publishes 3D graphics technologies like WebGL), and others. The preferred markup language for building Web pages is HTML. A Web page's structure is described in HTML. A number of elements make up HTML. The content's presentation in the browser is controlled by HTML elements. The labels "this is a heading," "this is a paragraph," "this is a link," etc., are provided by HTML elements.

To learn more about web programming refer to

https://brainly.com/question/27518456

#SPJ1

A LAN is usually confined in a single building.
True
False

Answers

Answer:

true

Hope it helps.you

list 20 specific purpose of application software​

Answers

Answer:

1. Word processing

2. Spreadsheet creation and analysis

3. Database management

4. Presentation creation and delivery

5. Graphic design and editing

6. Video editing

7. Music production

8. Web browsing

9. Email management

10. Project management

11. Time tracking and monitoring

12. Accounting and financial management

13. Inventory and supply chain management

14. Human resources management

15. Customer relationship management

16. Sales management

17. Marketing management

18. Education and training

19. Healthcare management

20. Scientific research and analysis

What does the Control unit do?

Answers

Answer:

The control unit controls and monitors communications between the hardware attached to the computer. It controls the input and output of data, checks that signals have been delivered successfully, and makes sure that data goes to the correct place at the correct time..

Hope it is helpful

Answer:

The control unit controls and monitors communications between the hardware attached to the computer. It controls the input and output of data, checks that signals have been delivered successfully, and makes sure that data goes to the correct place at the correct time.

HOW CAN YOU GET THE COOLEST FONTS ON GOGGLE SLIDES???

Hint: Im looking for like bubble letters or like stuff to like install for goggle slides, now mind u i do have a/am using a Chromebook so ya

Answers

i would love to help. but if you could text my number i could help more. i have a chromebook

Answer:

mhmm. you can go to www.bubbleimages.com

Explanation:

What is the argument in this function?
=AVERAGE(F3:F26)

Answers

Answer:

F3:F26

Explanation:

The AVERAGE function calculates the average of numbers provided as arguments. To calculate the average, Excel sums all numeric values and divides by the count of numeric values.

how does standby preemption affect the router configured with the highest priority in the hsrp group? (select two.) answer if the active router fails and then regains service, it does not become the active router again when preemption is not enabled. if the standby router fails and then regains service, it becomes the active router if preemption is enabled. if preemption is disabled, the standby router takes over as the active router. if the active router fails and then regains service, it becomes the active router again if preemption is enabled. if the active router fails and then regains service, it becomes the active router again, regardless of whether preemption is enabled.

Answers

If the active router fails and then regains service, it does not become the active router again when preemption is not enabled. If the standby router fails and then regains service, it becomes the active router if preemption is enabled. The correct options are A and B.

What is HSRP group?

Multiple routers on a single LAN can share a virtual IP and MAC address that is set as the default gateway on the hosts using HSRP.

One router is designated as the active router and another as the standby router among the routers configured in a HSRP group.

When preemption is disabled, if the active router fails and then regains service, it does not become the active router again.

If preemption is enabled, the standby router becomes the active router if it fails and then regains service.

Thus, the correct options are A and B.

For more details regarding HSRP group, visit:

https://brainly.com/question/29646496

#SPJ1

A message is sent over a noisy channel. The message is a sequence x1​,x2​,…,xn​ of n bits (xi​∈(0,1)). Since the channel is noisy, there is a chance that any bit might be corrupted, resulting in an error (a 0 becomes a 1 or vice versa). Assume that the error events are independent. Let p be the probability that an individual bit has an error (0

Answers

The probability of at least one error occurring in the message is 1 minus the probability of no errors, which is given by 1 - (1 - p)^n.

The probability that an individual bit is transmitted without error is (1 - p), where p is the probability of an error occurring for each bit. Since the error events are assumed to be independent, the probability of no errors occurring in all n bits is the product of the probabilities of each bit being transmitted without error:

P(no errors) = (1 - p) * (1 - p) * ... * (1 - p) (n times)

= (1 - p)^n

On the other hand, the probability of at least one error occurring in the n bits is equal to 1 minus the probability of no errors:

P(at least one error) = 1 - P(no errors)

= 1 - (1 - p)^n

To know more about probability

https://brainly.com/question/31828911

#SPJ11

I will brainlist

LEAN manufacturing is mostly used in automobile
manufacturing?

True or False

Answers

Answer:

True

Explanation:

Answer:true

Explanation:

What is referred to by the phrase “Web 2.0”?

Responses

A)a new plug-in that could be added to a computer to allow it to better navigate the Web

B)a new technology that allowed users to navigate the Web much faster

C)a new community of Internet users that had never before used technology

D)a new way of using Internet technology to facilitate collaboration

Answers

A new way of using Internet technology to facilitate collaboration is referred to by the phrase "Web 2.0". It refers to a shift from static web pages to interactive and collaborative platforms that allow for user-generated content and participation. The correct answer is D)

The phrase "Web 2.0" refers to a shift in the way the internet is used and experienced by users. It marks a move from static, one-way communication to a more interactive, collaborative, and participatory web. Web 2.0 emphasizes user-generated content, social networking, and online collaboration.

It is characterized by websites and applications that allow users to contribute and share information, as well as to interact with other users in a more social and dynamic manner. Examples of Web 2.0 technologies include blogs, social media platforms, wikis, and video sharing sites. The term was first coined in 2004, and since then, the shift to Web 2.0 has had a profound impact on how people communicate, learn, and work online.

For more questions on technologies:

https://brainly.com/question/13044551

#SPJ11

write a Python program to print the multiplication table of 4​

Answers

Answer:

multiplier = 0

while multiplier <= 12:

   print(f'4 times {multiplier} = ' + str(4 * multiplier))

   multiplier += 1

Explanation:

The multiplier is just a variable

while the variable is equal to or less than 12, the program will print "4 times (multiplier value) = (4 times the multiplier value)"

the multiplier value then is increased each time the while loop is completed(which is 12 times)

And when the multiplier value is equal to 12, the program will stop, hope this helps! A simpler version would just be

multiplier = 0

while multiplier <= 12:

   print(4 * multiplier)

   multiplier += 1

Answer:

Use the code below

Other Questions
Can you plz answer this question I need it ASAP Van purchased a DVD player on sale. The initial price was $ 154.30 The price after the discount was $ 132.17 What was the percent of decrease (discount rate)? Northern Railway is considering a project which will produce annual sales of $975,000 and increase cash expenses by $848,000. If the project is implemented, taxes will increase from $141,000 to $154,000 and depreciation will increase from $194,000 to $272,000. The company is debt-free. What is the amount of the operating cash flow using the top-down approach Develop a model explaining the impacts of Wolves, of Isle Royale National Park, Ml in its environment. This model can be a drawing with labels - or any other type of model you'd like tocreate to demonstrate this concept. consider the square below find the value of x if the area is 49 square units HELPPPPPPPPPPPPPPPPPPPPPPPPPP Complete The dialogue between Toms and Diana: . an unemployment insurance program has which of the following effects?a) it decreases the amount of personal income of the unemployed.b) it increases the severity of a recession because it makes it more difficult for the unemployed tofind jobs.c) it increases the amount of time spent searching for a job.as) it lowers the overall unemployment rate. help please I will give brainliest which of the following is the best definition of a certified financial planner? triangle ADE is shown below with overline BC || overline DE. if AC = 8, AE = 10, and AB = 10, which of the following is the length of overline BD?1.) 2.52.) 23.) 12.54.) 4 Bill wants to save for his sons college expenses. He knows what tuition will cost in 18 years and knows the interest rate on the bank account. What he doesnt know is how much to deposit each month to save enough for his sons college expenses. Which Excel formula would you use? Mrs. Lewis had $100 to purchase school supplies for her class. She bought 40 glue sticks and 40 boxes of crayons. Each glue stick cost $1.50, and each box of crayons cost $0.89. How much money did Mrs. Lewis have left after these purchases? which shape is both a rectangle and a square But what is the solstice exactly?I did the main idea pls and two piece of evidence A 75-kg person, starting from rest, sleds down a slide 40. m high hill reaching the bottom with a speed of 18 m/s. Calculate a) the PE at the top, b) the KE at the bottom of the hill, c) and finally, the thermal energy that was generated in the process. Logan is a land surveyor. He wants to determine d, the distance across a lake that cannot be directly measured. He draws this diagram to help him. A right triangle with side length 7 kilometers, d, and hypotenuse of 9 kilometers. What is the approximate distance across the lake, to the nearest tenth of a kilometer? 5. 7 km 6. 3 km 11. 4 km 16. 0 km. A CRITICAL THINKINGArgument Write a memo to thepresident identifying your choiceand explaining the reasons foryour recommendation. If youwant additional information aboutone or more candidates, identifythat information. Which of the following is NOT a characteristic of animals ? A. The ability to make food B. The ability to moveC. Eukaryotic cells D. Cells that lack cell walls what is 3/4. 1/6