1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
14

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru

nning public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Computers and Technology
1 answer:
Liula [17]3 years ago
8 0

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

You might be interested in
All of these valid ways to earn money in microworkers except
vovikov84 [41]

Answer:

yes u are trus

Explanation:

mark me as brainliest hehe

8 0
3 years ago
Data files whose records are always retrieved in sequence from the beginning of the file are known as
dimaraw [331]

Answer:

sequential files

Explanation:

Q:

Data files whose records are always retrieved in sequence from the beginning of the file are

A:

sequential files

3 0
2 years ago
A ____________ is the intersection of a column and row in an excel spreadsheet.
kogti [31]

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

4 0
3 years ago
What might be the cause of a black screen right after you install a new video card?
s344n2d4d5 [400]
Perhaps you failed to properly connect the monitor to the new video card?
5 0
4 years ago
While viewing a presentation, what feature is used to annotate a slide? Drawing Tools Pen Theme Shortcut Keys
Simora [160]
Drawing tools, or pen
5 0
4 years ago
Other questions:
  • The color band that represents tolerance on a resistor is the?
    11·1 answer
  • On laptops with a smart card reader installed, where is the smart card reader usually located?
    13·1 answer
  • Jerry’s managing a Google Search campaign and would like to improve the position in which his ads appear. He’s increased his bid
    15·1 answer
  • What is the purpose of the making of Nintendo Switch?
    10·2 answers
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • Not every organization integrates with the Internet, but all use some or most of the technology that gave rise to it.
    15·1 answer
  • The best way to take control of the first page of Google is to
    14·1 answer
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    15·1 answer
  • The Internet is a worldwide communications network. Which device connects computer networks and computer facilities?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!