answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IRINA_888 [86]
2 years ago
14

Mary recently read about a new hacking group that is using advanced tools to break into the database servers of organizations ru

nning public websites. In risk management language, what term is used to describe a hacking group? Group of answer choices Risk Threat Actor Vulnerability Standard
Computers and Technology
1 answer:
Liula [17]2 years ago
8 0

Answer:

Threat

Explanation:

In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.

You might be interested in
Leah wants to create a PowerPoint presentation for a history report about the progressive era in the 1900s. To
Nutka1998 [239]

Answer:

File

Explanation:

8 0
2 years ago
Read 2 more answers
A computer scientist creates a necklace to celebrate the birth of her daughter. The necklace encodes her daughter's
Vesna [10]

Answer:

26

Explanation:

I just know it ok; rjkhshwnwjk

5 0
2 years ago
First, open two separate terminal connections to the same machine, so that you can easily run something in one window and the ot
dusya [7]
Dnt listen to da file shi
7 0
2 years ago
What is the purpose of using self.id in tests, while working with unittest?A. self.id returns the name of moduleB. self.id retur
ikadub [295]

Answer:

B. self.id returns the name of method.

5 0
2 years ago
Excerpt from "How Prepared Are Students for College Level Reading? Applying a Lexile-Based Approach."
Lesechka [4]
The options that gives that answer to the question how it was determined that students are graduating from high school unprepared for college-level work is A. high rates of enrollment in remedial college courses.
The other options present the facts how graduates are successful, but we can see by the number of people who take these remedial courses that that is actually not the case.
7 0
2 years ago
Read 2 more answers
Other questions:
  • A search box does all of the following EXCEPT ________.
    12·2 answers
  • Which task can a company perform with intranets?
    9·2 answers
  • What is the formula equivalent to the function =SUM(B1:B5)?
    11·2 answers
  • A good website design combines which of the following elements? (select all that apply) powerful web server hardware components
    9·2 answers
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    7·1 answer
  • Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
    9·1 answer
  • An entrepreneur is opening a computer store in a small town and wants to display a few laptops in the store, but is concerned ab
    11·2 answers
  • int decode2(int x, int y, int z); is compiled into 32bit x86 assembly code. The body of the code is as follows: NOTE: x at %ebp+
    5·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!