1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
2 years ago
12

A security engineer implemented once-only tokens and timestamping sessions. What type of attacks can this type of security preve

nt
Computers and Technology
1 answer:
Sergeu [11.5K]2 years ago
5 0

The type of attacks that this type of security prevent are:

  • A replay attack
  • A pass-the-hash-attack

<h3>What is a replay attack?</h3>

A replay attack is known to be a form of network attack where a said attacker is known to detects a data transmission and he or she is the one that fraudulently delayed it or repeated it.

Based on the above scenario, The type of attacks that this type of security prevent are:

  • A replay attack
  • A pass-the-hash-attack

Learn more about A replay attack  from

brainly.com/question/25807648

#SPJ1

You might be interested in
Fill in the blanks in the SQL statement below that will list the invoice number, invoice total and credit which is the total sum
ki77a [65]

Answer:

Following are the query and its explanation:

Explanation:

SELECT invoice_number , invoice_total , FORMAT ((payment_total +credit_total),2) AS Credit FROM invoices;

In the above given select command it selects two columns that are "invoice_number , invoice_total" in which it uses the format method that adds "payment_total  and credit_total" parameter value and divides the value, and holds its decimal point value use by the invoices table.

5 0
3 years ago
(Language is in Java)
Gre4nikov [31]

import java.util.Scanner;

public class InchesToFeetInteractive

{

public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   final int INCHES_IN_FOOT = 12;

   int inches = scan.nextInt();

   int feet;

   int inchesLeft;

   feet = inches / INCHES_IN_FOOT;

   inchesLeft = inches % INCHES_IN_FOOT;

   System.out.println(inches + " inches is " +

   feet + " feet and " + inchesLeft + " inches");

   }

}

We import the Scanner class and then initialize a new Scanner named scan. We then get an integer representation of inches from the user and calculate the feet and inches from the value entered by the user.

7 0
3 years ago
Your objective is to create a set of files to be used as ‘flags’ that will be stored on computers used in a ‘capture the flag’ c
Semenov [28]

The following are the steps involved in the Process validation to the industry standard,

1)     Design of the process

2)     Qualification of the process

3)     Verification of the process

Explanation:

Validation is the process of finding whether the process meets its expected outcome.

1)     Construct knowledge about the process to be performed and establish a final design.

2)     Evaluation of the designed process is being done at this stage to rectify the errors and changes can be done.

Test the process to check whether the expected goal of the process being designed is achieved or not.

5 0
4 years ago
UDP provides unreliable data transfer and therefore
vova2212 [387]

Answer: The answer is d.

Explanation:

UDP is a transport protocol (Layer 4 of the OSI model) that has no mechanism to provide a reliable transport between the source process and the destination one, as TCP does.

Anyway, due to this feature, is specially suitable for real-time applications , like video or audio, provided that the user can accept some loss in the stream.

Several real-time protocols, like RTP for instance (used for videoconferencing)  use UDP as transport protocol.

4 0
3 years ago
Which options are available when a user modifies a recurring appointment? Check all that apply. Open this occurrence Open the fi
Rus_ich [418]

Open this occurence and open the series is the two options to choose from, from the dialog box that shows when attempting to modify the appointments

4 0
4 years ago
Read 2 more answers
Other questions:
  • Sql is an example of a ________ category programming language. 4gl 3gl 5gl 2gl
    15·1 answer
  • Suppose you are organizing a party for a large group of your friends. Your friends are pretty opinionated, though, and you don't
    14·1 answer
  • Which term describes the degree to which a network can continue to function despite one or more of its processes or components b
    14·1 answer
  • 2x + 3y = 11<br>y = x-3​
    8·2 answers
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • What invention in the past do you think had a significant impact on our culture/ lifestyle? What do you think will be invented/
    11·1 answer
  • Create a basic program that accomplishes the following requirements: Allows the user to input 2 number , a starting number x and
    12·1 answer
  • You are about to repair and change the resistor (small components),but the components are too small to solder and hold,what tool
    12·1 answer
  • What are the characteristics of the Outlook Rules Wizard? Check all that apply.
    6·1 answer
  • 13. You're doing research for a paper. When would you use an indirect citation?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!