answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
2 years ago
13

A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject

Computers and Technology
1 answer:
Leviafan [203]2 years ago
4 0

Answer:

a. indirect

Explanation:            

When a system is attacked by a hacker and this infected system is used to attack other systems then it is called indirect attack.  This type of attack is often initiated by a 3rd party computer. It is difficult to find from where this kind of attacks is originated.

Direct attack is when a system is attacked directly by an attacker by installing malicious software or often by getting unauthorized physical access to a computer. So option b is not true.

So the correct option is a. indirect.

You might be interested in
Suggest two other subtasks that may be performed in a dice game?
saul85 [17]
I do not even know wht to tell u
4 0
2 years ago
Read 2 more answers
if you had two proxy servers located in the same room, what use could you make of them? nothing create a hub sell one of the ser
Anit [1.1K]
Create a free wifi service
6 0
2 years ago
Read 2 more answers
There are two methods of enforcing the rule that only one device can transmit. In the centralized method, one station is in cont
Levart [38]

Answer:

In centralized method, the authorized sender is known, but the transmission line is dominated by the control station, while in decentralized method, one station can not dominate the line but collision on the transmission line may occur.

Explanation:

Centralized method of communication requires for a control station to manage the activities if other stations in the network. It assigns turns to one known station at a time, for transmission.

Decentralized method allows stations in a network to negotiate and take turns in transmitting data. When a station is done with the transmission line, another station on the queue immediately claims the line.

3 0
2 years ago
____ is a program placed on a computer without the user's knowledge that secretly collects information about the user
Scrat [10]
<span>Spyware is a program placed on a computer without the user's knowledge that secretly collects information about the user.
</span><span>The spyware gathers information and can send this information to another program or entity which can take control over the device or use personal information to harm the user. </span>
7 0
2 years ago
Which task can a company perform with intranets?
gregori [183]
I would probably say C, Though you might want a second, person to clarify. But My answer is C..
6 0
2 years ago
Read 2 more answers
Other questions:
  • In an ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
    7·1 answer
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • A business wants to centralize its administrative tasks. At the same time, it wants the existing systems to manage and sustain t
    14·2 answers
  • When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to d
    9·1 answer
  • As you are planning your informative speech on the prevalence of Internet memes in pop culture and you wonder if your audience w
    14·1 answer
  • With respect to the general classes of computers, a ________ is the most expensive and most powerful kind of computer, which is
    7·1 answer
  • How can a signature be added to an email message? Check all that apply.
    10·2 answers
  • The geographic coordinate system is used to represent any location on Earth as a combination of latitude and longitude values. T
    5·1 answer
  • Nstructions
    7·1 answer
  • Identify the tips to create a well-designed digital portfolio.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!