Question: a ) Threat b ) Threat actor c ) Threat action d ) Vulnerability e ) Security incident f ) Attack g ) Passive attack
a Threat b Threat actor c Threat action d Vulnerability e Security incident f Attack g Passive attack h Active attack i DoS and DDoS j Malware k MITM ManintheMiddle attack MachineintheMiddle attack l Phishing m Ransomware n Replay attack o Spoofing p Social Engineering
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
