1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
10

List and briefly describe passive and active security attacks.

Computers and Technology
1 answer:
Rama09 [41]3 years ago
4 0

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

You might be interested in
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
aleksley [76]

Answer: Spread spectrum

Explanation:

In spread spectrum the data to be transmitted is spread over a wider bandwidth rather than fixed bandwidth.

4 0
4 years ago
A _________ is the broadcast of various types of media over the web.
Dmitry [639]
News Report.
I hope this helps! :)
4 0
4 years ago
Read 2 more answers
You have two DCs, each with three Active Directory-integrated zones. You're getting inconsistent DNS lookup results and suspect
nikklg [1K]

Since their or two domain controller and where their or three active directory is associates.

  • As first check the tcpip ranges to be checked if both falls on same tcpip address. Better to change the one from tcpip address.
  • Second is host and subdomain has to checked and reconfigure if necessary.
  • Computer name and connected their group to be checked.
  • With NSLOOKUP command from disk operation system come check ping tracking reply is positive or negative.

When we query for DNS, end user need to see the positive reply from list of servers. Possible for scanning the IPV6 address across the domains and find as positive or negative response. End user has to decide the primary and secondary domain controller’s

Normally secondary domain controller’s as to be configured as standard alone. On success on deciding primary and secondary domain controller’s automate the process from primary to secondary by configuration with ns records. Possible for domain partition also.

8 0
3 years ago
Which question is most closely related to the field of biology? A.How thick is a paper bag? B.What determines the growth rate of
Andrei [34K]
B. What determines the growth rate of a fish population
6 0
4 years ago
Read 2 more answers
When you first launch presentation software, how many blank slides will appear on your screen?
nataly862011 [7]

one, the title slide

6 0
3 years ago
Read 2 more answers
Other questions:
  • A ________ -tier design includes a middle layer between the client and server that processes the client requests and translates
    11·1 answer
  • Answer how do you properly dispose of a large box of assorted computer parts, including hard drives, optical drives, computer ca
    11·1 answer
  • What are sums of money that are given out for specific reasons?
    5·2 answers
  • In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program call
    15·1 answer
  • What is the first step in planning a multi-table query?
    14·1 answer
  • 4. Where do you find the command to create bibliography citations or a table of contents?
    14·2 answers
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • printArray is a method that accepts one argument, an arrayof int. The method prints the contents of the array; it does not retur
    5·1 answer
  • What does network administration normally include? Check all of the boxes that apply.
    8·1 answer
  • Use the drop-down menus to complete statements about options for inserting video files.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!