Describe the difference between direct and indirect attacks.
What will be an ideal response?
A direct attack is when a hacker uses a personal computer to break into a system. An indirect attack is when a system is compromised and used to attack other systems, such as in a botnet (a collection of software programs that operate autonomously to attack systems and steal user information) or other distributed denial-of-service attack. Direct attacks originate from the threat itself. Indirect attacks originate from a system or resource that itself has been attacked and is malfunctioning or working under the control of a threat.
You might also like to view...
With a ____ instance, you can specify which of its frames to play first.
A. movie clip B. graphic C. transition D. baseline
If you disable all macros except digitally signed macros, then ________
A) all macros are disabled and Access provides security alerts if there are macros present B) you disable all macros with notification, except digitally assigned macros C) Access allows all macros to run, which makes your computer vulnerable to potentially malicious code and is not recommended D) all macros and security alerts about macros are disabled
Once created, a PivotTable cannot be edited
Indicate whether the statement is true or false
The Photoshop feature that will record a sequence of actions in order to apply it to a folder of images is called _____
a. Actions b. Macros c. Memories d. Do-overs