1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
2 years ago
11

A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici

ous IP address. What type of attack did the hacker perform
Computers and Technology
1 answer:
balu736 [363]2 years ago
7 0

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

You might be interested in
An abstraction is a simplified representation of something that is more complex. Decimal numbers were a useful abstraction in th
Blababa [14]

What was the content of the lesson? It is hard to answer a question we need context on.

6 0
3 years ago
Which of the following is usually used to connect a monitor to a computer?
viva [34]

Answer:

DVI cable

Explanation:

DVI is for video signals.

Some monitors have a usb hub built in and therefore also have a USB connection, but that is not their primary function.

5 0
3 years ago
Read 2 more answers
HELP ME PLEASE
rosijanka [135]

Answer:

Variable, operator, expression, value.

Explanation:

We could use variables, operators, expressions, and values in a mathematical formula, we're going to do an example with every part.

For this example we're going to use a simple sum formula:

First, we have 3 variables:

sum;

sum1;

sum2;

Second, we have 3 operators:

=, + and *

Third, we have our expression and 1 value:

sum = sum1 + (sum2 * 5);

(sum2 * 5) = expression;

5 = value;

We're going to see the result when we print the variable sum.

8 0
3 years ago
Read 2 more answers
Code in Python
KIM [24]

You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:

user_num = int(input())

while user_num>=1:

   user_num/=2

   print(user_num)

I wrote my code in python 3.8. I hope this helps.

4 0
2 years ago
Which of the following best describes the constraints within a model?
Yanka [14]

Answer:

ask google

Explanation:

4 0
3 years ago
Other questions:
  • What is a way to minimize technical problems with computer
    13·1 answer
  • What is the full form of the acronym WWW?
    13·2 answers
  • What command would you use to list the text files in your
    7·1 answer
  • Which one of the following is not the name of a 20th century school composition
    14·2 answers
  • Read the following scenario, and then answer the question below.
    15·2 answers
  • What is the first and last value of i to be displayed by the following code snippet? int n = 20; for (int i = 0; i &lt;= n; i++)
    10·1 answer
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • When you move into a new home or apartment, the first thing on your checklist should be to have the ____________ changed. (5 Let
    13·1 answer
  • Which step in the software development life cycle analyzes the scope of work?
    6·1 answer
  • Including the word OR will make a search less specific.<br> O False<br> O True
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!