1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
2 years ago
11

A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici

ous IP address. What type of attack did the hacker perform
Computers and Technology
1 answer:
balu736 [363]2 years ago
7 0

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

You might be interested in
Choose 2 statements that correctly describe the time complexity of data structures with N data.
Softa [21]

The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

<h3>What is time complexity of data structures?</h3>

Time Complexity of an algorithm is known to be the depiction of the amount of time needed by the algorithm to carry out to completion.

Note that The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

Learn more about data from

brainly.com/question/17350816

#SPJ1

6 0
2 years ago
Sub to the channel plz plz
Hunter-Best [27]

Answer:

um

Explanation:

6 0
3 years ago
Read 2 more answers
Who would like to join a team devoted to decreasing spam and bullying?
Tema [17]
Yes i would love to help the cause <span />
6 0
3 years ago
Microsoft word's spell checker?
vekshin1
The answer to the given picture is - Microsoft word's spell checker only recognizes very common words. Microsoft word has it's own dictionary which will be compared to the texts on your document. If they see an unfamiliar word they will underline it with red. Anyways you can add your own words and names to the custom dictionary.
8 0
3 years ago
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
saveliy_v [14]

Answer:

System software.

Explanation:

System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.

An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

4 0
3 years ago
Other questions:
  • Computer maker Dell realized the problems with keeping large inventories, especially because of the fast rate of obsolescence of
    7·1 answer
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    13·1 answer
  • What is the turns ratio of the transformer T10261
    5·1 answer
  • Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another s
    5·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • The central point of Christian belief is that God, the Father, entered into human history as the
    15·1 answer
  • State the Limitations of the first generation of computers​
    8·1 answer
  • Write the simplest statement that prints the following: 3 2 1 Go! python
    6·1 answer
  • What will be the output, if any, when the user clicks the right mouse button?
    5·1 answer
  • Which code block is an example of a motion block in scratch?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!