This topic contains a solution. Click here to go to the answer

Author Question: A __________ attack attempts to learn or make use of information from the system but does not affect ... (Read 75 times)

Tazate

  • Hero Member
  • *****
  • Posts: 532
A __________ attack attempts to learn or make use of information from the system but does not affect system resources.
 
  What will be an ideal response?

Question 2

Student grade information is an asset whose confidentiality is considered to be highly important by students and, in the United States, the release of such information is regulated by the __________.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

milbourne11

  • Sr. Member
  • ****
  • Posts: 322
Answer to Question 1

PASSIVE

Answer to Question 2

FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT (FERPA)




Tazate

  • Member
  • Posts: 532
Reply 2 on: Jul 7, 2018
Gracias!


tanna.moeller

  • Member
  • Posts: 328
Reply 3 on: Yesterday
Excellent

 

Did you know?

The human body produces and destroys 15 million blood cells every second.

Did you know?

Only one in 10 cancer deaths is caused by the primary tumor. The vast majority of cancer mortality is caused by cells breaking away from the main tumor and metastasizing to other parts of the body, such as the brain, bones, or liver.

Did you know?

Opium has influenced much of the world's most popular literature. The following authors were all opium users, of varying degrees: Lewis Carroll, Charles, Dickens, Arthur Conan Doyle, and Oscar Wilde.

Did you know?

The liver is the only organ that has the ability to regenerate itself after certain types of damage. As much as 25% of the liver can be removed, and it will still regenerate back to its original shape and size. However, the liver cannot regenerate after severe damage caused by alcohol.

Did you know?

Computer programs are available that crosscheck a new drug's possible trade name with all other trade names currently available. These programs detect dangerous similarities between names and alert the manufacturer of the drug.

For a complete list of videos, visit our video library