1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
2 years ago
10

Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t

est. What technique has she used
Computers and Technology
1 answer:
ValentinkaMS [17]2 years ago
8 0

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

You might be interested in
Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
zmey [24]

Answer:

self-modeling

Explanation:

Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.

For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. <em>For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.</em>

7 0
3 years ago
One concern some users have about storing data or accessing applications in the cloud is .
andriy [413]

Answer:

Explanation:

Security is the primary concern about cloud computing. This is the main for many IT departments to refrain from using cloud computing. Some things that put the security of cloud computing to be concerned are: Theft or loss of intellectual property.

3 0
3 years ago
जिल्ला । स्तरीय = 'जिल्ला स्तरीय' भए जस्तै तलका शब्दमा स्तरीय जोडेर
Gekata [30.6K]

Answer:

Well, I guess you could use a special representation of the function through a sum of terms, also known as Taylor Series.

It is, basically, what happens in your pocket calculator when you evaluate, for example,  

sin

(

30

°

)

.

Your calculator does this:

sin

(

θ

)

=

θ

−

θ

3

3

!

+

θ

5

5

!

−

...

where  

θ

must be in RADIANS.

In theory you should add infinite terms but, depending upon the accuracy required, you can normally stop at three terms.

In our case we have:  

θ

=

π

6

=

3.14

6

=

0.523

and:

sin

(

π

6

)

=

sin

(

0.523

)

=

0.523

−

0.024

+

3.26

⋅

10

−

4

−

...

=

0.499

≈

0.5

Explanation:

3 0
4 years ago
What may happen if a larger number of computer users are attempting to access a Web site at the same time that u r??? I think it
Semmy [17]
I think if a large number are accessing at the same time you would have to wait for many to clear up

3 0
3 years ago
An important result of the development of anesthesia was?
Ksju [112]
It could be #2 since the patient would be asleep under the anesthesia they would be able to perform amputations more often since the patient would not be able to feel the pain during the procedure. It could also be #3 because if the patient is asleep you could use a more direct approach instead of avoiding certain procedures that would put the patient in a lot of pain if it was performed while they were awake. In all I would say the answer is #2, please comment which is the right answer, thank you.
7 0
4 years ago
Other questions:
  • based on the transcript, what did broadcasting the story through the medium of radio allow welles to do?
    8·1 answer
  • Which is the best description of a hierarchical report?
    13·1 answer
  • Fill in the blanks.
    6·2 answers
  • Acomputer with a domain name is called a
    8·1 answer
  • Where can information on metalworking occupations be found?
    14·2 answers
  • A function ________ contains the statements that make up the function.
    5·1 answer
  • What is the function of the following shape? display result to user get input from user make a decision process information
    7·1 answer
  • What is the safest way to pay online​
    13·2 answers
  • What could be a pass word if the hint is stayton its for windows 10 <br><br> please help
    5·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!