1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
7

What is the difference between a threat and an attack?

Computers and Technology
1 answer:
Sergio [31]3 years ago
3 0

Answer:

A Threat is a possible security violation that might exploit the vulnerability of a system or asset. Attack is an deliberate unauthorized action on a system or asset. Attack can be classified as active and passive attack.

You might be interested in
What is ucspi-tcp pakage in qmail??
Ket [755]

Answer: UCSPI-TCP is the sort of domain for the public that helps in building the client-server application of TCP using the command line tool of UNIX TCP in qmail

Explanation: UCSPI-TCP is referred as the UNIX Client-Server Program Interface with the help of TCP (transfer control protocol) .It is usually used for the management of the IP (internet protocol) present on the server and checks which IP's should be permitted for the connection with SMTP(simple mail transfer protocol)services.It also manages the variable or the environment constant that IP want to utilize .

8 0
3 years ago
Why is technology bad for you
Inessa05 [86]

Answer: Constant device use might strain your eyes. It can cause a headache, focus issues, itching, blurred or double vision, and light sensitivity. This is one of the main arguments against technology that we may make.

Explanation:

3 0
2 years ago
Read 2 more answers
How can a search be narrowed to only search a particular website????
vesna_86 [32]

Answer:

There are a variety of ways to narrow down your search results in a library database. The two most direct ways are to focus your search with more specific keywords and/or to limit by various criteria before or after searching. The more specific you are with your search terms, the more relevant your results will be

Hope it helped!!!

4 0
3 years ago
Business Risks are ​
blondinia [14]
Business risk is the exposure a company or organization has to factor(s) that will lower its profits or lead it to fail.
8 0
3 years ago
Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
olchik [2.2K]
The Answer is color:blue for changing an element's font color to blue
8 0
4 years ago
Read 2 more answers
Other questions:
  • Write a program for playing tic tac toe. Two players take turns marking an available cell in a 3 X 3 grid with their respective
    15·1 answer
  • the piece of hardware that contains the circuitry that processes the information coming in to the computer
    13·1 answer
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • Retraining is required at intervals of ___ or less.
    10·1 answer
  • A foreign exchange student brought his desktop computer from his home in Europe to the United States. He brought a power adapter
    9·1 answer
  • Describe how both IPv4 and IPv6 access and utilize TCP as an upper-layer transfer protocol.
    6·1 answer
  • What does it mean for a heap to be complete?
    7·1 answer
  • Define Indentation
    8·1 answer
  • Why is it difficult to convince top management to commit funds to develop and implement a Strategic Information System
    13·1 answer
  • Consider a game that is searched using random restart hill climbing strategy. Assume that the success rate for the game is 25%.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!