1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
2 years ago
11

You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro

ot password on the web server. Which classification of attack type is this
Computers and Technology
1 answer:
cluponka [151]2 years ago
3 0

This type of attack can be classified as an active attack.

<h3>The classification of attacks.</h3>

In Cybersecurity, there are four (4) main types of attacks and these include the following:

  • External
  • Passive
  • Inside
  • Active

In this scenario, the type of attack being experienced by the security analyst is an active attack because it was discovered that someone attempted to brute-force the root password on the web server.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

You might be interested in
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in h
earnstyle [38]

Answer:

1 - Monitoring the data coming in and out of the companies network and limiting the amount of sensitive information or completely blocking it with a rattrap firewall or any other network monitoring device.

2 - Creating a windows system image (if it were to be a windows device) and saving it in a closed location with a disk only capable of writing without reading.

Explanation:

7 0
2 years ago
How can the two independent clauses below be combined to form a correct complete sentence? Check all that apply.
stepladder [879]
Jonas has homework that isn’t finished.
3 0
2 years ago
Image
Marat540 [252]

Answer:

This is related to the curiosity gap. What we know, we are never interested in, and what we don't know always attract us. Here, the first headline is Go Ahead and Play that, is not creating any curiosity as there is no indication what is there inside the video, apart from the message that it is a video game. Hence, curiosity is not induced. There should be a hint to create curiosity, and take advantage of the curiosity gap. However, in the second headline, it does hint that there can be something good for us, And hence, the advantage of the curiosity gap is being used. And we will click because of the curiosity. Hence, the second headline is a more appropriate one.

Explanation:

Please check the answer section.

7 0
3 years ago
Bobbi owns a protein shake company, which has been trading for 3 years. Her products are stocked in a number of gyms, but the co
N76 [4]

Answer:

Actions that Bobbi should take to identify opportunities for online business growth are:

Review competitor websites

Identify a USP

Build a SWOT analysis

Explanation:

The first thing Bobbi should do is to review competitor website.

This will give her information about her competitors the products that they offer, the price of their products, the website layout and structure of the competitors, any strategy they are using to boost their online product sale  such as by offering product promotion, discounted price etc.  

After reviewing competitor websites, next thing that Bobbi should do is  identify a Unique Selling Proposition. Bobbi should identify the unique features, benefits of her products that induce her business to stand out from the competitors. Identify all those unique aspects and factors that make her product different from others.

After identifying USP, Bobbi should now build a Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis. This way she will be able to  recognize and understand her website's strengths, distinctive competencies, limitations, opportunities and risks. This will help her to analyse the overall strategic position of her website as well as her business. That will help her create a strategy for the future.

8 0
3 years ago
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
Other questions:
  • Wide area network (WAN) connects multiple networks that are in the same geographical locations.
    6·1 answer
  • What is the different between ethical and legal issues?​
    6·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • How do I delete my brainly account?<br> I don't need anymore.
    13·2 answers
  • What is Celeste? ( This is for my coding class )
    6·2 answers
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • The _____ method randomly rearranges the items in the list provided in the parentheses.
    5·2 answers
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • How do i know my child's login info for parent infinite campus
    14·1 answer
  • It refers to the story or events in which the film revolves.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!