1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zlopas [31]
3 years ago
6

What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio

d?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

You might be interested in
Which term describes the distinct number of colors a graphic contains? (1 point)?
laila [671]
Your answer would be "Hue".
4 0
3 years ago
In computer science, what are two names that are used to describe data structures organized by association
Bas_tet [7]

Answer:

Answer to the following question are,

  • Association list
  • Tables

Explanation:

Because these are the two associations data structures.

  • Association List: are referred to that data type which contains the pair of the key and item in the Java Programming Language and Python Programming Language, it is called a dictionary data type.
  • Tables or Hash Tables: are referred to that data type which converts the keys into the integer value.
6 0
3 years ago
If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font s
Daniel [21]

If a data label, title, or legend in a chart is difficult to read, you can format them as bold, but you cannot change the font size: False.

<h3>What is a chart?</h3>

A chart can be defined as an effective medium that is used to graphically display data in a pictorial form. Thus, a chart comprises the following elements:

  • Data label
  • Title
  • Legend

If the aforementioned elements in a chart is difficult to read for the end users, they can easily format them as bold and equally change the font size.

In conclusion, the elements in a chart can be formatted as bold and their font size can also be changed.

Read more on chart here: brainly.com/question/24741444

8 0
2 years ago
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
Which file formats are used for importing and exporting data from OpenOffice Base?
Gennadij [26K]

Answer:

Examples of The file formats used for importing and exporting data from open office are:

  • Open Document formats (.ods and .ots )
  • Impress
  • star-writer formats ( .sdw,.sgl and .vor)

In open-office base you can import data from a Database file ( C )

you can export to a spreadsheet ( A )

Explanation:

An open-office base is a fully designed desktop database management system. it is designed to serve a very large number of users especially in a firm. it can be used to track personal CD's and even used to produce monthly/yearly sales report for any department in the firm.

It is designed with JAVA as the programming language and it can run on most operating systems like: Linux windows and Mac    

5 0
3 years ago
Read 2 more answers
Other questions:
  • Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
    11·1 answer
  • which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
    6·1 answer
  • What is required to contain warnings, after several studies that have shown that they are a suffocation risk?
    15·2 answers
  • What does not stand for​
    15·2 answers
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • What is the difference between KE an PE
    8·1 answer
  • The image shows a sample group contract.
    13·2 answers
  • Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint:
    5·1 answer
  • What is the difference between a crosstab query and a subquery?
    11·2 answers
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!