1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
8

How does a passive attack differ from an active attack?

Computers and Technology
1 answer:
larisa [96]3 years ago
4 0

Active and Passive Attacks are security attacks. In Active attack, an attacker tries to modify the content of the messages. Whereas in Passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. ... In Passive Attack, information remain unchanged. Hope this helped :)

You might be interested in
If there is a combination of two or more attributes which is being used as the primary key then we call it as
Hunter-Best [27]

Answer:

Composite Keys.

.....Wubba Lubba Dub-Dub :))

5 0
3 years ago
What is collaboration software?
LenKa [72]
<span>I'm not sure but I do know Collaboration means working together toward a mutual goal. so I hope that helps at least a little </span>
7 0
3 years ago
Read 2 more answers
Which printing options are available in the Print menu? Check all that apply.
sasho [114]

1

3

4

6

mam nadzieje że pomogłem                                                  

6 0
3 years ago
Read 2 more answers
If you want to stop the current flow through Device 3 in the circuit shown above, which one of the following single switches sho
Ber [7]
A is the answer because it's the best
7 0
4 years ago
You are the head of the corporate security department, and the Microsoft teamhas asked you for some assistance in setting the pa
IgorC [24]

Answer:

d. Local Security Policy

Explanation:

Local security policy refers to different security settings that are present on a local computer. Local security policy can include administrative rights assignments and password.

This can also mean policies that enables an administrators to set users privileges by so doing guiding what users are permitted to do on the computer.

6 0
3 years ago
Other questions:
  • เเปลภาษานิราศภูเขาทอง
    10·1 answer
  • Your colleagues are discussing the operation of a device in which packets are routed between VLANs on the device rather than hav
    7·1 answer
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • The Internet raises the bargaining power of customers most effectively by: making information available to everyone. reducing ba
    15·1 answer
  • Describe practices that enable software designers to think about using patterns?
    10·1 answer
  • How do you know where the home row of the keyboard is?
    14·2 answers
  • (1101101)2 − (1001)2
    15·1 answer
  • A person who breaks into a computer, network, or online site is called
    14·2 answers
  • QUESTION 9 / 10
    13·1 answer
  • In addition to letting people share files, what is the most useful feature of
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!