1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
2 years ago
10

Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t

est. What technique has she used
Computers and Technology
1 answer:
ValentinkaMS [17]2 years ago
8 0

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

You might be interested in
You connect your computer to a wireless network available at the local library. You find that you can access all of the websites
leva [86]

Answer:

There must be a  proxy server that is not allowing access to websites

Explanation:

A wireless network facility provided in colleges, institutions, or libraries is secured with a proxy server to filter websites so that users can use the network facility for a definite purpose. Thus, that proxy server is not allowing access to all of the websites to the user on the internet except for two.

4 0
3 years ago
r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions. Tru
Dvinal [7]

r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions.

The above statement is <u>True</u>.

What are R packages?

<u>The statistical programming language R has extensions </u>known as R packages. Users of R can install R packages by <u>accessing a centralized software repository like CRAN</u>, which often contains code, data, and documentation in a common collection format.

The "library" directory is <u>where R </u><u>packages </u><u>are kept in the R environment</u>. During installation, R automatically install a number of packages. Later, when additional packages are required for a particular task, they are added.

To learn more about R packages, use the link given
brainly.com/question/26125959
#SPJ4

7 0
1 year ago
The piston engine uses the ________ to convert the reciprocating motion of the piston into rotary motion.
PSYCHO15rus [73]

The piston engine uses the crankshaft to convert the reciprocating motion of the piston into rotary motion.

<span>The crankshaft is used to convert reciprocating motion of the piston into rotary motion, while the conversion process is called torque, which is a twisting force. Aside from crankshaft, there are a total of four parts of the engine that work together in order to convert the reciprocating motion into rotary motion namely cylinder, or also called the chamber of the piston, the piston itself, and the connecting rod.</span>

5 0
3 years ago
Var name = prompt("Enter the name to print on your tee-shirt");
Vinil7 [7]

Willy Shakespeare has 17 characters. It's higher than 12,so the output will be Too long. Enter a name with fewer than 12 characters.

Letter a.

3 0
3 years ago
Jane wants to add a chart to her presentation so she’ll click the Insert tab and in the Images group, she’ll click the Chart but
kap26 [50]

(A. Stevie only) because You need to go the illustrations tab in order to click on the chart button.

Jane clicked on images tab so she was wrong.

Mark as brainlest plz :)

3 0
3 years ago
Other questions:
  • Write the code to compute and output how many times the value 99 is found in an array of integers named numbers
    11·1 answer
  • A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
    12·1 answer
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • How often does colleges update the cost of attendance on their website?.
    13·1 answer
  • Which option can be used to access more settings than are available in the Backstage view?
    5·1 answer
  • How do you invite someone to a conversation on brainly
    14·1 answer
  • Software that displays advertising material when online.
    12·2 answers
  • Please help this is a coding assignment I need help! (use python)
    12·1 answer
  • What do you mean by HDML coding ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!