1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
4 years ago
6

A(n) _____ is a network attack in which an intruder gains access to a network and stays undetected with the intention of stealin

g data.
Computers and Technology
1 answer:
Archy [21]4 years ago
7 0

Answer:

Advanced persistent threat (APT)

Explanation:

The above is defined as follow.

Advanced

The attacker uses advanced technological utilities to enter the network and remain unidentified.

Persistent

The attacker upon entering the network, remains focused on the given task, i.e., establishing back door throughout the network by utilizing malware.

Threat

This is both a threat and an attack. The threat to information and an attack since unwanted infrastructure is installed by the attacker.

In this type of attack, the hacker ( or unauthorized party ) manages to access the network. The presence of the hacker is not known, and the hacker remains hidden. The sole reason for this attack is to gain access to the data and not disrupting the network or the organization.

This type of attack is a major threat to organizations involved in security, financial transactions and production industry.

The hacker leaves the network once the hacker gets hold of the information. The hacker enters and exits the network quickly to avoid being noticed.

The hacker enters the network through legitimate way. Next, the hacker manages to acquire login information of an authorized user. As and when the hacker can move across the network using the login of another authorized user, the hacker begins creating the back door. The back doors established by the hacker help in exiting the network.

The above cycle is carried on until the hacker remains unidentified.

This is a unique and more dangerous threat since the attacker remains unidentified for a long period of time. In this duration, the attacker records the information easily.

APT Mitigation

Traditional security mechanisms prove ineffective in combating with APT. Due to varied types of malware software, it is not easy to detect APT. This makes the protection from APT somewhat difficult.

Deep analysis of the network activities and highly sophisticated security mechanism can help mitigate APT.

You might be interested in
What is one distinguishing feature of Italian opera buffa in comparison to comic opera of other countries?
vodka [1.7K]

Answer:

It is sung throughout.

Explanation:

5 0
3 years ago
The divBySum method is intended to return the sum ofall the elements in the int arrayparameter arr that are divisible by the int
charle [14.2K]

Answer:

Explanation:

The following program is written in Java and creates the divBySum method using a enhanced for loop. In the picture attached below I have provided an example of the output given if called using the array provided in the question and a divisible parameter of 3.

public static int divBySum(int[] arr, int num) {

       int sum = 0;

       for (int x : arr) {

           if ((x % num) == 0) {

               sum += x;

           }

       }  

       return sum;

   }

4 0
3 years ago
Saturn has an orbital period of 29.46 years
Alona [7]

This is true. I'm not sure what you're asking here, but if it's a true/false statement, it's true.

3 0
4 years ago
Read 2 more answers
A SQL data source is a control that can be used to get data from a SQL ________________ file such as a Microsoft SQL Server file
AleksAgata [21]

Answer:

The answer is "Data"

Explanation:

A Data source is essentially the wellspring of the Data. It tends to be a document, a specific Database on a DBMS, or even a live Data feed. The Data may be situated on a similar PC as the program, or on another PC some place on an organization

At least, every SQL server database has two working operating system records: a Data filet and a log Data. Data files contain Data and items, for example, tables, files, put away methodology, and perspectives. Log records contain the data that is needed to recuperate all exchanges in the Database. Data files can be assembled in file groups for portion and organization purposes.

3 0
3 years ago
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the orga
lawyer [7]

The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

<h3>What are servers?</h3>

A server is known to be a form a computer program or device that helps to give a service to a given computer program and its user.

Note that in the case above, The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

Learn more about servers from

brainly.com/question/17062016

#SPJ1

8 0
2 years ago
Other questions:
  • How to calculate 100MB at 56 Kbps to transfer time?
    13·1 answer
  • What is Service Oriented architecture &amp; How is it different form Object Oriented Middleware?
    6·1 answer
  • Alcohol _____________.
    10·1 answer
  • Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then
    15·1 answer
  • Select the correct answer.
    9·1 answer
  • ......... mi2hej<br><br>ejid8eo19o1b2bxhxjxjdnneejk2929nr
    5·2 answers
  • Vegetable farming is a good source of income explain this statement<br>​
    5·1 answer
  • Helpppppp meeeeeeeeeeeeeeeeee
    12·1 answer
  • A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.
    12·1 answer
  • What was Ada Lovelace's contribution to computer science?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!