1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Doss [256]
2 years ago
7

4.8% complete this is a single choice question; skip ahead to question content a b c d confirm difficulty level: moderate an int

ruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimately establishes a session with a web server. what type of attack can the intruder perform with the cookie file?
Computers and Technology
1 answer:
PilotLPTM [1.2K]2 years ago
4 0

Answer:

A replay attack

You might be interested in
When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representi
Dvinal [7]
ANSWER:
b) Sequencing

Explanation:
A set of programming blocks that make actions happen one after another. When you have two sprites in your Scratch project they can each have a sequence of programming blocks to make them do something.

Hope it helps u! :)
7 0
3 years ago
An invisible path determining the way of travel from one place to another.
WARRIOR [948]

Answer:

i dont really like computors

Explanation:

im not good at it

3 0
3 years ago
1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
Sav [38]

Answer:

The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.

Explanation:

A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.

An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.

7 0
3 years ago
What is 1/10 of 2.0 in decimal form​
son4ous [18]

Answer to this is .2

5 0
3 years ago
PLZ HELP 60 points!! Minor changes to objects which only take effect at render time are called:
slega [8]
It’s literally all b
5 0
3 years ago
Other questions:
  • A pacing calendar is provided to students so they can:
    8·2 answers
  • The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
    8·2 answers
  • Laura has identified the job she wants, the skills needed for the position, and the areas she needs to improve in order to get i
    10·1 answer
  • The _____ of a local variable is the function in which the variable is created.
    6·1 answer
  • A different way of pronoucing the same words is called a _____
    15·1 answer
  • _____ is rampant with bugs and shortcomings because most programmers do not know how or do not take the time to incorporate secu
    14·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • What do people in the movie e.t think about the character E.T
    9·1 answer
  • What is the minimum ethernet frame size that will not be discarded by the receiver as a runt frame?.
    8·1 answer
  • How do u type please help
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!