1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kap26 [50]
3 years ago
10

List and briefly describe passive and active security attacks.

Computers and Technology
1 answer:
Rama09 [41]3 years ago
4 0

Answer:

Passive security attack are the unauthorized disclosure in the network attack. In this type of security attack a system are use for monitoring and sometimes scanning the open port. It basically include the monitoring the unprotected data and traffic analysis.

On the other hand, active security system modify the transmitted data and gain the unauthorized access from the computer system.

This type of security attack basically monitor the file transfer and electronic mail from the attacks which can be pass in the form of viruses in the computer system.

You might be interested in
Which storage con be used<br>as permanent storage<br>a) Rom<br>6) RAM, © main memery​
Veseljchak [2.6K]

Answer:

ROM

Explanation:

Data in ROM does not erase itself when the computer is shut down. The data is permentely written and stored.

4 0
3 years ago
Software built and delivered in pieces is known as
mafiozo [28]

Answer:

Incremental technique is the way in which software is built and delivered in pieces. The concept is to keep the client and developer on same page and the client is known as a non tech person, so he should be given software in piece by piece to avoid any confusion and sudden change.

Agile method is the best example of this technique in which steps are defined on contract basis and the software is delivered and build by pieces to keep client and developer on same page.

8 0
3 years ago
Read 2 more answers
Low-level formatting ____. Group of answer choices is different from physical formatting is usually performed by the purchaser o
Drupady [299]

Low-Level formatting is usually performed by the purchaser of the disk.

<h3>What is low-level formatting?</h3>

Low-Level formatting can be defined as is performed at the factory which electronically creates the hard drive tracks and sectors and tests for bad spots on a disk surface.

Low-level formatting is usually performed by the purchaser of the disk device.

Therefore, B is the correct option.

Learn more about Low-level formatting here:

brainly.com/question/13797778

#SPJ1

3 0
2 years ago
Choose the proper term to describe each of the following examples.
Lady_Fox [76]

Answer:first 1

Explanation:

4 0
3 years ago
Why am I constantly getting bombarded with brainly plus ads and how to fix this without paying for it?
Helga [31]

Answer:

there really is no way to fix it. I've tried everything everybody says sorry

8 0
3 years ago
Read 2 more answers
Other questions:
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    7·1 answer
  • Impact of computer on education
    6·2 answers
  • ________ to a base class may be assigned the address of a derived class object.
    8·2 answers
  • What does the phrase at the drop of a hat mean?
    11·2 answers
  • How do I take this prodram back off
    15·1 answer
  • Bob has 2 candy bars he is fat what hapennes
    5·2 answers
  • Write a C program that reads two hexadecimal values from the keyboard and then stores the two values into two variables of type
    15·1 answer
  • Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Te
    10·1 answer
  • Which emerging technologies will have more injury on our day to day country &amp; How?​
    10·1 answer
  • What is boot sector virus​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!