A _________ attack attempts to learn or make use of information from the system but does not affect system resources.

Fill in the blank(s) with the appropriate word(s).

passive

Computer Science & Information Technology

You might also like to view...

Bookmarks from all users are typically organized on the main site of the social bookmarking service

Indicate whether the statement is true or false

Computer Science & Information Technology

Why is it important to reduce deliverables to a smallest component?

What will be an ideal response?

Computer Science & Information Technology