1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
6

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio

d?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

You might be interested in
At what point in a vulnerability assessment would an attack tree be utilized?
ella [17]
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
6 0
3 years ago
What three actions happen when you cloak a folder or file?
Bumek [7]

Answer:

A three actions happen when you cloak a folder or file is explained below in details.

Explanation:

You can cloak data and folders on the forgotten or local site. Cloaking eliminates cloaked data and folders from the subsequent actions:

Presenting Get, Check-In, and Check-Out executions

Producing reports

Getting newer local and newer forgotten files

Accomplishing sitewide executions, such as monitoring and modifying links

Synchronizing

Working with Asset panel contents

Refreshing templates and libraries

3 0
3 years ago
Write a complete method from the client perspective that duplicates each element in place in a ListInterface object. For example
Sergio039 [100]

Answer:

The method is the list contains a 3 out of 3, and creating another list would be 20 out of 20 points.

8 0
3 years ago
Choose the response that best completes the following statement.
Soloha48 [4]

Answer:

probably the 5 second pause

7 0
3 years ago
Read 2 more answers
Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
monitta

Answer:

For higher revenue, the mamagement of income, discounts and all financial matters whereby the use of technology can help by installing a

BUSINESS APPLICATION

4 0
3 years ago
Other questions:
  • Brad teaches an accounting class, and he created a PowerPoint presentation from a Word outline for his class. This Word outline
    14·1 answer
  • What is an incremental backup?
    7·1 answer
  • What nuclear remediation site had their computers wiped clean by notpetya?
    15·1 answer
  • What is not true of credit scores?
    11·1 answer
  • Create and Provide complete program that includes a comments header with your name, course, section and other program details an
    9·1 answer
  • What are the 3 dimensions referenced when we say 3D?
    10·1 answer
  • 9.6 Code Practice<br> Instructions<br> 1<br> Declare a 4x 5 array called N<br><br> Please helppp
    9·1 answer
  • __' the low level language? a.machine and assembly c.3G and 4G d.machine and 4gl​
    15·1 answer
  • Can anyone help me with these assignments??? Hands On Assignments- Insertion of Symbols, Special Characters, and Images.... and
    9·1 answer
  • Select the correct answer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!