1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
14

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru

nning public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Computers and Technology
1 answer:
Liula [17]3 years ago
8 0

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

You might be interested in
What is an example of constructive criticism for an employee who frequently arrives late?
aleksley [76]
I believe the correct answer is A
5 0
3 years ago
Read 2 more answers
How to find how much storage is left on pc?
FinnZ [79.3K]
Go to your general settings and click on data usage and it should show you how much storage is left.
6 0
3 years ago
PLEASE HELP THIS WAS DUE YESTERDAY AND I DIDN'T GET TO IT IN TIME!!!!!!
kykrilka [37]

Answer:

dDAgv

Explanation:

sdc sdc sdc trust me

7 0
3 years ago
While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar
sergejj [24]
When in slide show mode, the menu bar and that "x" are not visible.
5 0
3 years ago
Read 2 more answers
We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th
Svetlanka [38]

Answer:

i dont know

Explanation:

3 0
3 years ago
Other questions:
  • ___ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
    5·1 answer
  • How can i promote netiquette??​
    10·1 answer
  • Which type of optical scanner works in a manner similar to a copy machine?
    15·1 answer
  • The File method lastModified() returns
    10·1 answer
  • Write a recursive function that returns true if the digits of a positive integer are in increasing order; otherwise, the functio
    15·1 answer
  • 1.printer is an example of......... device.<br><br>​
    11·2 answers
  • I really need this done Thank you!!
    6·1 answer
  • What is the benefit of hosting a website on a personali
    6·1 answer
  • What is 2+2 I need to know hurry
    12·2 answers
  • Whats the flow in this code, and whats the risk that its creating and what can i do to fix it? (c language)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!