1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
6

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio

d?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

You might be interested in
Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
Step2247 [10]

Answer:

In the clarification portion below, the definition according to the received information is summarized.

Explanation:

  • <u>Characterization:</u>

It is indeed a summary of general object characteristics in something like a target class and creates characteristic laws.

  • <u>Discrimination:</u>

Just before predefined data types have been held to a different standard from everyone else, it's indeed bias which always happens.

  • <u>Association:</u>

It's a mechanism that determines the possibility that objects in a set will co-occur.

  • <u>Classification:</u>

It is indeed duction which attributes elements to target groups or classes in a set.

  • <u>Prediction:</u>

It is solely dependent on either the interpretation of other similar values to classify data points.

  • <u>Clustering:</u>

It has been used to position the components of the information through their corresponding classes.

  • <u>Evolution Analysis:</u>

It would be for objects whose behavior varies throughout time to explain or design regularities.

5 0
3 years ago
What is a stored​ procedure?
pshichka [43]

Answer:

The right answer is Letter B. It is an area of memory that is used for dynamic memory allocation.

Explanation:

<em>Because a store procedure is not a computer program,neither a computer software . It is a type of code or subroutine available to applications that access a relational database management system. Such procedures are stored in the database data dictionary. It serves to save time and memory, extensive  or complex processing that requires execution of several SQL. </em>

6 0
3 years ago
Some of y'all make me lose braincells with your questions
boyakko [2]

Answer:

ok done we will try

BTW have a nice day enjoy your day Stay blessed stay happy stay strong

5 0
3 years ago
Read 2 more answers
Pls answer 10 points ​
AlekseyPX

Answer:

1. C

5.b

Explanation:

1. Is c because it is in the short cut key

5. Is B because it is the last choice

3 0
3 years ago
Read 2 more answers
In which area is composing for games different from composing for movies?
kondaur [170]

Answer: royalties earned

Explanation:

In areas such as the looping scores, temp tracks and adaptive scores, there are similarities when composing for games and when composing for movies.

The area where there is difference when composing for games and composing for movies is the royalties earned. The interest that is earned on royalties for both cases are different.

8 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • ________ computers are specially designed computer chips that reside inside other devices, such as a car. Select one: A. Tablet
    11·2 answers
  • Using an LCD projector to show an online video to a group of people is an example of:
    14·1 answer
  • Exactly how thin is the air in outer space?
    10·1 answer
  • A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more tha
    10·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • The amount of white space or vertical space between the lines of the text in a paragraph is called line spacing.
    13·1 answer
  • Put these events in the order in which they occurred,
    9·1 answer
  • An epic games service is unavailable at the moment
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!