1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
3 years ago
14

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru

nning public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Computers and Technology
1 answer:
Liula [17]3 years ago
8 0

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

You might be interested in
Read the argument below and determine the underlying principle that was used to come to the conclusion presented: It is recommen
PIT_PIT [208]

Answer:

Hence option a is the correct one. Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved,

Explanation:

a) Driving a car can be dangerous, but if you learn how to properly drive a car then you can significantly reduce the risk involved.

As it belongs How to be a good car driving without risk as equivalent diet concept as a base.

Less than 3-5 servings of vegetables a day not taken equivalent car driving dangerous if no proper driving.

Hence option 1 is valid.

b) is wrong as it has negative feedback regarding the base case.

c) is a suggestion for the strong part which is also the wrong option

5 0
3 years ago
Difference between first and second generation of computers. <br>​
Harman [31]

\mathcal{\fcolorbox{black}{orange}{\pink{Question:}}}

Difference between first and second generation of computers.

\mathcal{\fcolorbox{black}{orange}{\red{Answer:}}}

Refer to attachment.!

<h3>Hope It's helped mate! :)</h3>

7 0
3 years ago
Examples of email use that could be considered unethical include _____.
AfilCa [17]

Answer:

"Denying receiving an e-mail requesting that you work late "

"Sending a quick message to your friend about last weekend "

"Sharing a funny joke with other employees"

Explanation:

Based off of the questions, I assume it means while you are at work. If you're at home or something, all of these are fine.

3 0
3 years ago
Read 2 more answers
What is the most difficult part of working with the Help system?
zysi [14]
A help system refers to a documentation component that usually accompany every software. It is meant to help the users when they encounter problems in the course of using the software. The most difficult part of working with the help system IS PHRASING YOUR QUESTION. A user has to use the correct words and phrases in order to get the needed help from the help system. 
5 0
3 years ago
What are the various types of views available for Word 2016?<br><br> a.<br><br> b.<br><br> c.
lora16 [44]

What are the various views available in MS Word?

Microsoft Word gives you five different views of a document, and each has its own advantages over the others. They are Print Layout, Full Screen Reading, Web Layout, Outline and Draft and you can guess what purpose some of them serve just by their names.

3 0
3 years ago
Other questions:
  • How does computer store binary digits?​
    11·1 answer
  • Which statement describes a mobile device feature? Docking stations can add some functionality to mobile devices such as video o
    11·1 answer
  • Which is an example of synchronous communication? e-mail voicemail text message telephone conversation
    11·2 answers
  • Text and graphics that have been out of copied are stored in area called the _____
    15·2 answers
  • How to do a Spreadsheet ??
    6·1 answer
  • What is the two’s compliment of -95,-122,-111,-57
    9·1 answer
  • What is known as the global network of computers?
    9·2 answers
  • How to combine multiple documents into one pdf.
    10·1 answer
  • What are the examples of computer software​
    8·2 answers
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!