1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
13

A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject

Computers and Technology
1 answer:
Leviafan [203]3 years ago
4 0

Answer:

a. indirect

Explanation:            

When a system is attacked by a hacker and this infected system is used to attack other systems then it is called indirect attack.  This type of attack is often initiated by a 3rd party computer. It is difficult to find from where this kind of attacks is originated.

Direct attack is when a system is attacked directly by an attacker by installing malicious software or often by getting unauthorized physical access to a computer. So option b is not true.

So the correct option is a. indirect.

You might be interested in
Decision-making problems that can be stated as a collection of desired goals are known as what type of problem? A goal programmi
Vera_Pavlovna [14]

Answer:

True. A goal programming problem

Explanation:

Goal programming is an optimisation technique to solve problems with multiplicity of objectives, which are generally in commensurable and they often conflict each other in a decision making horizon.In a certain programming environment, optimisation of a set of objectives is involved there in the decision situation. Here, instead of optimising them directly, achievement of the assigned target values called aspiration levels of them is considered. In goal programming method, the unwanted deviations (under and / or over) from the aspired levels are minimised in the goal achievement function (objective function) to reach a satisfactory solution in a crisp decision environment

4 0
3 years ago
What are the different types of computer operating systems?
MissTica

Answer:Apple iOS. Apple's iOS is a popular operating system for smartphones. ...

Microsoft Windows. ...

Apple MAC OS. ...

Linux Operating System. ...

Real-Time Operating System. ...

Normal Operating System.

Explanation:

3 0
2 years ago
You discover many errors in a database table. What has been lost?
Ira Lisetskai [31]

Answer:

A)field and record

Explanation:

4 0
3 years ago
Read 2 more answers
A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day
kipiarov [429]

Answer:

Option A (CRL) is the right answer.

Explanation:

  • Certificates with respective expiration date canceled mostly by CA generating or providing them, then it would no longer be tolerated, is considered as CRL.
  • CRL verification could be more profitable for a platform that routinely manages several clients, all having pronouncements from a certain CA, because its CRL could be retrieved once per day.

Other given choices are not connected to the given scenario. So Option A is the right one.

7 0
3 years ago
"last month, our sales rose when we increased prices by 15%, so we should raise our prices another 15% this month." which logica
LekaFEV [45]

In"last month, our sales rose when we increased prices by 15%, so we should raise our prices another 15% this month." the logical fallacy is Confusing a correlation for a cause-and-impact courting.

<h3>What is a logical fallacy?</h3>

A logical fallacy is a assertion that appears to be authentic till you observe the regulations of logic. Then, you recognize that it is not. Logical fallacies can regularly be used to deceive people – to trick them into believing something they in any other case wouldn't.

In many ways, the put up hoc ergo propter hoc fallacy is a particular subset of the fallacy in which a person might also additionally anticipate a causational courting from one that would simply be a wonderful correlation.

Read more about the fallacy :

brainly.com/question/1971023

#SPJ1

6 0
2 years ago
Other questions:
  • You have an executive who needs her print jobs handled above those of others. how would you accomplish this advanced printing co
    8·1 answer
  • P**nhub or x-videos or other
    9·1 answer
  • What do you like most about brainly?
    13·2 answers
  • On a camera,what does focus tracking do?
    6·1 answer
  • If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel
    14·1 answer
  • (Java)Write a program that calculates and displays the conversion of an entered number of dollars into currency denominations—20
    11·1 answer
  • What is another word for: a location in memory that contains a value?
    7·2 answers
  • Serting a header at the top of a page will make it appear on_____. ?
    13·1 answer
  • Which protocol is responsible for transporting files between a client and a server?
    14·2 answers
  • Beth is a software developer who is focused on identifying early-stage interface problems. Beth addresses the dimension of usabi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!