Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Passive attacks are considered a threat to _______.
Home
Cyber Security
Passive attacks are considered a threat to _______.
0
votes
asked
Oct 23, 2021
in
Cyber Security
by
john ganales
Passive attacks are considered a threat to _______.
Choose the correct options from below list
a) Availability
b) Integrity
c) Authenticity
d) Confidentiality
passive-attacks
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Oct 23, 2021
by
john ganales
Correct answer of the above question is : d) Confidentiality
Passive attacks are considered a threat to Confidentiality
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Which threat hunting platform applies Artificial Intelligence to detect and hunt for cyber attacks in real time?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#hunting-platform
#threat-hunting-platform
#threat-artificial-intelligence
0
votes
Q: When Machine Learning models are employed for threat intelligence what is considered to be an infrastructure challenge?
asked
Feb 15, 2022
in
Security Analytics with Apache Metron
by
sharadyadav1986
machine-learning-models
apache-metron
0
votes
Q: Which technique of Threat hunting is considered to be the "least difficult" to hunt?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#search
+2
votes
Q: Software that is secure on a given platform, environment, and threat landscape can be considered secure in any other platform, environment or threat landscape.
asked
Feb 15, 2022
in
SSA Audits
by
sharadyadav1986
secue-software
platform
envionment
0
votes
Q: DoS attacks are prevented using _______.
asked
Mar 5, 2022
in
API Gateways
by
rajeshsharma
dos-attack
0
votes
Q: Can you please explain what are the types of cyber-attacks?
asked
Sep 2, 2020
in
Cyber Security
by
Robindeniel
#cyber-attacks
0
votes
Q: Results of Threat modeling carried out during design review should be considered during which of the following phases of SDLC?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
+1
vote
Q: Which of the following can execute all the possible combination of attacks?
asked
May 14, 2021
in
Cyber Security
by
rajeshsharma
attacks
cyber-attacks
cyber-security
burp
http-requests
burp-repeater
burp-suite-tasks
burp-suite-projects
burp-suite-user-interface
burp-proxy
burp-target-scope
burp-suite-websocket
burp-extensions
burp-intruder
burp-proxy-spoofing
burp-collaborator
burp-scanner
0
votes
Q: Give examples of System-based attacks
asked
Sep 2, 2020
in
Cyber Security
by
Robindeniel
#system-based-attacks
0
votes
Q: List out web-based attacks
asked
Sep 2, 2020
in
Cyber Security
by
Robindeniel
#web-based-attacks
...