1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
2 years ago
12

A security engineer implemented once-only tokens and timestamping sessions. What type of attacks can this type of security preve

nt
Computers and Technology
1 answer:
Sergeu [11.5K]2 years ago
5 0

The type of attacks that this type of security prevent are:

  • A replay attack
  • A pass-the-hash-attack

<h3>What is a replay attack?</h3>

A replay attack is known to be a form of network attack where a said attacker is known to detects a data transmission and he or she is the one that fraudulently delayed it or repeated it.

Based on the above scenario, The type of attacks that this type of security prevent are:

  • A replay attack
  • A pass-the-hash-attack

Learn more about A replay attack  from

brainly.com/question/25807648

#SPJ1

You might be interested in
To become a news anchor, you should get a Bachelor's degree in:
Sveta_85 [38]

Answer:3

Explanation:

7 0
4 years ago
Read 2 more answers
(fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
nadya68 [22]
I think it’s data transmission
3 0
3 years ago
Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
RUDIKE [14]

Answer: B. ISO 38500

Explanation:

ISO 38500 is an international Standard specifically developed by the International Organization for Standardization to oversee corporate governance of Information Technology. It lays down principles to guide directors and leaders of organizations on how to comply with regulatory requirements in the use of Information Technology within the firm.

The framework consists of six guiding principles in the use of I.T and they include; establishing responsibilities, planning or strategizing on how best to support the organization, acquisition of validity, ensuring performance, conformity with rules and respect of the human factor or behavior.

It was derived from the Australian Standard for Corporate Governance of Information and Communication Technology - AS 8015 - 200.

8 0
3 years ago
In cryptocurrency, a block is only considered valid if it has a.
melomori [17]

Answer: Token

Explanation: The token gives proof that it is yours.

3 0
3 years ago
Which of the following best describes the infrastructure ISPs provide?
svet-max [94.6K]

Answer:

cables, towers, and underground tubes

Explanation:

Its certainly the above one, and through this internet service is being provided. So internet service is self-understood, and what ISP firstly provides are cables, underground tubes, and the towers. And it is only these all through which the ISP provides internet service. And remember we are in this question dealing with the infrastructure and not the services or products. Hence, phone service, websites, and files, as well as the emails, search engines, and the videos, are not the solution here as they are not the infrastructure. And ISPs never provide the computers, ethernet cables or keyboards.

Hence, the correct answer is as mentioned in the answer section.

4 0
4 years ago
Other questions:
  • When you divide a picture into thirds, how many parts do you end up with? *
    14·2 answers
  • How many bits are in 1 tb? [hint: depending on the tool used to calculate this, you may need to use a trick to get the exact res
    6·1 answer
  • The number of pixels displayed on the screen is known as ________.
    14·1 answer
  • Online companies typically have a(n) _________ on their websites that clearly states what information is collected from users an
    7·1 answer
  • Write the definition of a function named rotate4ints that is passed four int variables. The function returns nothing but rotates
    9·1 answer
  • NO BODY KNOWS! How old is Cynthia Blaise!?
    7·1 answer
  • What is the missing line?
    9·1 answer
  • Writing the E-mail:
    5·1 answer
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • Which company provides a crowdsourcing platform for corporate research and development?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!