1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
10

List and briefly describe passive and active security attacks.

Computers and Technology
1 answer:
Rama09 [41]3 years ago
4 0

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

You might be interested in
Pls help computer science I will give brainliest
marissa [1.9K]

Answer:

A driver assists with hardware management.

Hope this helped.

5 0
3 years ago
Read 2 more answers
10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subseq
Lynna [10]

he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus

3 0
2 years ago
Proxy data:
lapo4ka [179]

Answer: provide climate data representing times when instruments were not available to measure them.

Explanation:

Proxy data provides climate data representing times when instruments were not available to measure them.

6 0
4 years ago
Your mobile device has gone over its subscribed data limit the past two months. During this time, you have noticed that the devi
Zolol [24]

Answer:D. The device needs an operating system update

Explanation:Operating systems are different programs mainly manufactured by software companies like Microsof,Apple etc, after initially installation are loaded into the computer by a boot program, operating systems manages all of the other application programs in a computer, it requires constant upgrade in order to be able to effectively carry out its activities. Application programs uses the operating system by making requests for services through a defined application program interface (API). Examples include Windows 7, Windows 8, Windows 10, Blackberry OS, Operating system Linux etc.

6 0
3 years ago
100 tickets are sold in a raffle with one prize. John has 8 tickets, Jamie has 10 tickets, find the probability that John wins
Reika [66]

\frac{8}{100} or \frac{2}{25}
7 0
3 years ago
Read 2 more answers
Other questions:
  • The ____ is a single user, nonportable computer designed to perform engineering, cad, and software development work.
    9·1 answer
  • The smallest network
    13·1 answer
  • Which of the following could be omitted from a company's AUP? A.Permissible lunchtime online activities B.Employees' home email
    15·2 answers
  • Difference between query and filter<br><br>​
    12·1 answer
  • Speed in a given direction is called
    12·2 answers
  • A7DF is the hexadecimal representation for what bit pattern?
    8·1 answer
  • A ________ is a gateway service that permits users to log in once, with one specific user ID and password, to gain access to mul
    8·1 answer
  • You should structure the first before you search for a relevant picture.
    8·1 answer
  • Convert Fahrenheit to Celsius using this formula: F = (9/5)*C+32
    5·1 answer
  • An editing functions used to move selected text or objects to the Clipboard, from which they may be pasted elsewhere in the pres
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!