1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
14

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru

nning public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Computers and Technology
1 answer:
Liula [17]3 years ago
8 0

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

You might be interested in
Given the option of receiving a generic r_sum_ or a tailored r_sum_, employers prefer generic r_sum_s.
krek1111 [17]
<span>It is false that given the option of receiving a generic r_sum_ or a tailored r_sum_, employers always prefer generic r_sum_s. This is false because rarely do employers need something generic from you - they'd always want you to present them with a specific result because that is more important to them than receiving something general and common.</span>
3 0
3 years ago
An iPad Is An Example Of Which Type Of Computer?
Monica [59]
B.tablet because it is technically not a computer in traditional sence but a hand held device.
<span />
5 0
3 years ago
Read 2 more answers
Difference between ram and rom​
BigorU [14]

Answer:

<h2> RAM</h2>
  • <em>It</em><em> </em><em> </em><em>stands</em><em> </em><em>for</em><em> </em><em>Random</em><em> </em><em>Access</em><em> </em><em>memory</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>used</em><em> </em><em>for</em><em> </em><em>both</em><em> </em><em>purpose</em><em>(</em><em> </em><em>read</em><em> </em><em>and</em><em> </em><em>write</em><em>)</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>volati</em><em>le</em><em> </em><em>memory</em><em>.</em>
<h2><em>R</em><em>O</em><em>M</em></h2>
  • <em>It</em><em> </em><em>stands</em><em> </em><em>for</em><em> </em><em>Read</em><em> </em><em>only</em><em> </em><em>memory</em><em>.</em>
  • <em>It</em><em> </em><em>can</em><em> </em><em>be</em><em> </em><em>used</em><em> </em><em>only</em><em> </em><em>to</em><em> </em><em>perform </em><em>the</em><em> </em><em>read</em><em> </em><em>oper</em><em>ation</em><em>.</em>
  • <em>It</em><em> </em><em>is</em><em> </em><em>non-volatile</em><em>.</em>

<em>Hope</em><em> </em><em>this</em><em> </em><em>helps</em><em>.</em><em>.</em><em>.</em>

<em>Good</em><em> </em><em>luck</em><em> on</em><em> your</em><em> assignment</em><em>.</em><em>.</em><em>.</em>

8 0
3 years ago
Read 2 more answers
Jacob has a text file open, and he is typing on the keyboard. What is the best description of how the
Zolol [24]

Answer:

The new version is kept in a special virtual space; the file is only changed when he clicks "save."

5 0
3 years ago
Which of the following is NOT a data type in Python?
trapecia [35]

Answer:

No options

Explanation:

There are no options to pick from

8 0
3 years ago
Read 2 more answers
Other questions:
  • A. True
    8·2 answers
  • When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each inter
    5·1 answer
  • What is best method for modern businesses to authorize the use of workplace resources to its employees
    7·2 answers
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • Write a program that reads a series of strings andprints only those strings beginning with the letter "b."
    7·1 answer
  • Jason works as a Help Desk Technician for uCertify Inc. The company has a Microsoft Windows XP-based network. Jason wants to vie
    9·1 answer
  • What are cell phones used for?
    8·2 answers
  • Identify the problems that computer program bugs can cause. Check all that apply.
    9·2 answers
  • Rick is a fan of logic-based games. However, he is bored of the classic ones, like Sudoku and Mastermind, since he has solved so
    12·1 answer
  • GIVING BRAINLIEST! AND 100 POINTS.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!