A _________ attack attempts to learn or make use of information from the system but does not affect system resources.
Fill in the blank(s) with the appropriate word(s).
passive
Computer Science & Information Technology
You might also like to view...
Bookmarks from all users are typically organized on the main site of the social bookmarking service
Indicate whether the statement is true or false
Computer Science & Information Technology
Why is it important to reduce deliverables to a smallest component?
What will be an ideal response?
Computer Science & Information Technology