1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
13

A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject

Computers and Technology
1 answer:
Leviafan [203]3 years ago
4 0

Answer:

a. indirect

Explanation:            

When a system is attacked by a hacker and this infected system is used to attack other systems then it is called indirect attack.  This type of attack is often initiated by a 3rd party computer. It is difficult to find from where this kind of attacks is originated.

Direct attack is when a system is attacked directly by an attacker by installing malicious software or often by getting unauthorized physical access to a computer. So option b is not true.

So the correct option is a. indirect.

You might be interested in
Using data from a tal distribution database, define a view named toplevelcust. it consists of the number, name, address, balance
valentina_108 [34]
A) CREATE TABLE toplevelcust (number INTEGER PRIMARY KEY, <span> name TEXT, address TEXT, balance DOUBLE, credit DOUBLE</span>);

b) select number, name, credit - balance from toplevelcust

c) This I cannot answer
7 0
4 years ago
Read 2 more answers
IN YOUR OWN WORDS, create a new thread and compare and contrast paraphrasing, summarizing, and quoting and how to do each succes
choli [55]

Answer:

Such three ways to include the work of other writers in your own writing differ depending on whether you are close to the source.

Explanation:

Quotations must be the same as the original, using a narrow source segment. We must be word for word on the source document and the original author must be credited.

Paraphrasing means putting your own words into a line from the source material. The original source should also be assigned a paraphrase. Paraphrased material usually is shorter than the original one, which takes and slightly condenses a somewhat broader part of the source.

In summary, you have to put the main idea(s), including only the main point(s), in your own words. Again, summarized ideas must be attributed to the source. Summaries are much shorter than the original and give a broad overview of the source documents.

8 0
4 years ago
Which model states that the people and the environment for communication are constantly changing? A. linear B. interactive C. tr
In-s [12.5K]

The interactive model of communication states that the people and the environment for communication are constantly changing.

B. interactive

<u>Explanation:</u>

The world is a big place and you must have come across the infamous hearing, "Change is the only constant". Gradually, with the passage of time, the mindset of the people change over a certain topic for communication.

For instance, in old times, people did not prefer their children to have love marriages, in fact India has also seen honor killings to prevent love marriages. But now most portion of the society stands in favor of love marriages. People change, perspective change, and so does the perception and ideas.

6 0
3 years ago
The format painter button is found in the ____ group on the home tab of the ribbon.
Amanda [17]
<span>The format painter button is found in the <u><em>clipboard</em></u><em> </em>group on the home tab of the ribbon</span>
6 0
3 years ago
Assume that an Internet service provider (ISP) intentionally disclosed the contents of a lawful private e-mail message without c
Alexus [3.1K]

Answer:

Electronic Communications Privacy Act of 1986

Explanation:

<em>Electronic communications</em> involve the transfer of data, sounds, images, writing, signals, signs or any form of intelligence radio wire or any other means.

The Electronic Communication Privacy Act of 1986 (ECPA) was passed into law by the US Congress to further restrict inappropriate wiretaps of electronic data or telephone calls and also, prohibit access to stored electronic communications. They further added pen-trap provisions that allow the tracing of communications over the telephone.

All these were put in place to primarily prevent unauthorized access to government communications.

If an Internet Service Provider (ISP) intentionally discloses the content of a lawful private email message without consent, they have violated the Electronic communication Privacy Act of 1986 (ECPA).

4 0
3 years ago
Other questions:
  • How to write an shortened if statement?
    6·1 answer
  • What are the advantages of a diverse workforce? Select all that apply.
    6·2 answers
  • A ________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the custom
    11·1 answer
  • Which type of software has no restrictions from the copyright holder regarding modifications of the software’s internal instruct
    10·1 answer
  • Cations - Office 2016 A
    12·2 answers
  • Which of the following actions has no impact on your credit score
    9·1 answer
  • What if the result of conectivity testing is 100%Loss?Explain.​
    14·1 answer
  • Used for monitoring web activity by users to make sure that sensitive information won't leave the building.
    7·1 answer
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
  • Input images into a computer
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!