1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
9

At what point in a vulnerability assessment would an attack tree be utilized?

Computers and Technology
1 answer:
ella [17]3 years ago
6 0
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
You might be interested in
What are the max amount of warnings you get before you get banned?
Olenka [21]

Answer:

I'm not sure but I just got a warning from this person Kaite....

5 0
3 years ago
Read 2 more answers
Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
tensa zangetsu [6.8K]

Answer:

Lactic acid

Explanation:

Lactic acid builds up during strenuous exercise with limited amounts of oxygen.

7 0
3 years ago
Give two reasons why mobile internet may not be available everywhere. ​
andreev551 [17]

Answer:

Mobile Internet is dependant on cellular signal. Many countries, e.g. in Africa, don't have any coverage at all. Furthermore, mobile data might also not be available in the mountains as there are no cell towers and the rough terrain usually either blocks the signal entirely or weakens it significantly.

4 0
3 years ago
The vast amount of data collected from Internet searches, social media posts, customer transactions, military
Brums [2.3K]

Answer:

A. Big Data

Explanation:

It is big data. The internet searches, customer transactions, social media posts, medical tests, weather sensors, military surveillance, and all the data source you are seeing around yourself forms together with the big data. And a big social media company gathers around so many petabytes of data each day. And there are so many such companies, plus all sorts like eLearning sites, etc. And all these together form the big data.

3 0
4 years ago
If you are writing a program that needs to repeat a series of calculations, what programming structure should you use to repeat
elena55 [62]
A loop.

---------------------------------------
7 0
3 years ago
Other questions:
  • An administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server
    12·1 answer
  • What shooting position is commonly used when hunting with a shotgun?
    14·2 answers
  • A fitness tracker can be classified as a wearable computer. true
    9·1 answer
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • To computer the equivalent units of production, add: A. units completed plus a percentage of the beginning WIP units B. units co
    10·1 answer
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • Which of the following clauses of the UPDATE command is optional? (Points : 2) UPDATE
    11·1 answer
  • If you ship bakudeku. I swear. <br> *RANTS*
    11·1 answer
  • Write any two web browers​
    10·1 answer
  • 4.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!