Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Attacks that aim at performing malicious acts without being noticed:
Home
Mobile App Security
Attacks that aim at performing malicious acts without being noticed:
0
votes
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
Attacks that aim at performing malicious acts without being noticed:
Select the correct answer from below list:
a) Stealthy approach
b) .Harmful malicious approach
c) Disruptive approach
d) Covert approach
mobile-attacks
system-attacks
malware-attacks
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Feb 17, 2022
by
sharadyadav1986
d) Covert approach
Attacks that aim at performing malicious acts without being noticed is called as Covert approach
Related questions
+1
vote
Q: Being assigned as a project manager, you noticed during project execution that conflicts arise in the team on both technical and interpersonal levels. What is an appropriate way of handling conflicts?
asked
Oct 31, 2022
in
Agile
by
Robin
agile
pmp
0
votes
Q: A part of malware that performs the malicious action is _____________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
malware-programs
malware-application
0
votes
Q: The testing approach that is more useful for protection against internal attacks is __________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
protection
internal-attacks
0
votes
Q: Attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
asked
Apr 3, 2020
in
Data Handling
by
rajeshsharma
#xss-attacks
secure-code-review
DataHandling-questions-answers
0
votes
Q: What steps do you take to protect against malicious attacks such as DDoS or SQL injection?
asked
Mar 2
in
Azure
by
SakshiSharma
ddos
sql-injection
0
votes
Q: In computer security, a component of the malware, which is responsible for performing malicious action is referred to as _________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
0
votes
Q: In computer security, the component of the malware, which is responsible for performing malicious action is referred to as ___________.
asked
Feb 16, 2022
in
Digital Malware Analysis
by
sharadyadav1986
computer-security
malware
0
votes
Q: What if the public key , in fact belongs to a malicious third party performing a man-in-the-middle attack? what is countermeasure to avoid this scenario?
asked
Mar 17, 2021
in
SAS
by
DavidAnderson
ssa
0
votes
Q: The testing approach, where the tester has no prior knowledge about the application being tested is _________.
asked
Feb 17, 2022
in
Mobile App Security
by
sharadyadav1986
testing-approach
application-knowledge
0
votes
Q: A thief is noticed by a policeman from a distance of 200 m. The thief starts running and the policeman chases him. The thief and the policeman run at the rate of 10 km and 11 km per hour. after 6 min?
asked
Oct 31, 2019
in
Other
by
MBarbieri
...