1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
12

A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________

__ is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
Computers and Technology
1 answer:
Lynna [10]3 years ago
6 0

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

You might be interested in
Plz answer me will mark as brainliest ​
Vesnalui [34]
I’m pretty sure the answer for 1 is B.
And the answer for 2 is True.
4 0
3 years ago
Choose the proper term to describe each of the following examples.
Lady_Fox [76]

Answer:first 1

Explanation:

4 0
3 years ago
Reeve is a Landscape Architect. Which series of tasks would he be responsible for?
lana [24]
Creating models and operating heavy machinery 
3 0
3 years ago
Read 2 more answers
Write a SELECT statement that returns these columns from the Products table: The list_price column The discount_percent column A
MA_775_DIABLO [31]

Answer:

SELECT  

   list_price,

   discount_percent,

   ROUND(list_price * discount_percent / 100,2) AS discount_amount

FROM

   Products;

Explanation:

6 0
3 years ago
Choose the correct comparison statement about delivery and read receipts.
Lostsunrise [7]

Answer:

A: Delivery receipts can be enabled for all messages, while read receipts can be turned off by the recipient.

5 0
3 years ago
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • You want to plug a keyboard into the back of a computer. you know that you need to plug the keyboard cable into a ps/2 port. whi
    9·1 answer
  • Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz s
    11·1 answer
  • When summarizing graphs of categorical​ data, report the​ _______ and describe the​ _______?
    11·1 answer
  • BI is an umbrella term that combines architectures, tools, databases, analytical tools, applications, and methodologies. b. BI i
    10·1 answer
  • What is the output of the following program when the method is called with 4?
    11·1 answer
  • Given the declarations struct BrandInfo { string company; string model; }; struct DiskType { BrandInfo brand; float capacity; };
    11·1 answer
  • Write. true or false​
    5·2 answers
  • Most of the energy we use originally came from:
    8·1 answer
  • A user calls to report that she’s unable to log on to e-mail, and you ask a couple of questions. Because you know that no one el
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!