1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
poizon [28]
1 year ago
10

There are various risks from attacks on wi-fi networks. These include all of the following except _____.

Computers and Technology
1 answer:
Mariulka [41]1 year ago
5 0

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

<h3>What is malware?</h3>

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
kirill [66]
You should state what language you want your answer to be in before you ask programming questions. Here is what you're looking for in Java:

<span>public static String replace(String str) {
    return str.replace(' ', '*')<span>;
</span>}</span>
6 0
3 years ago
I love the brainly update guys! :)
earnstyle [38]

Answer:

you mind if i take these points?

Explanation:

3 0
3 years ago
Read 2 more answers
Assume the existence of a Building class with a constructor that accepts two parameters: a reference to an Address object repres
kolbaska11 [484]

Answer:

public ApartmentBuilding (Address addr, int sqFoo, int totUn) {

  super(addr, sqFoo);

  this. totalUnits = totUn;

}

Explanation:

To pass up parameters from a subclass constructor to a superclass constructor you just need to define a parameter name in the subclass constructor (in this case addr and sqFoo, but it can be anything you like) and then use the keyword super.

The keyword super acts exactly the same as the constructor of the superclass, however that may be defined.

And for the rest of the parameters (E.G. the ones of the sub class) you just treat them as a regular constructor.

8 0
3 years ago
The term platform as a service has generally meant a package of security services offered by a service provider that offloads mu
Stells [14]

Answer:false

Explanation:

8 0
3 years ago
Other questions:
  • Elsa has collated information for a meeting using Excel. Due to certain developments, some of the data in her worksheet is now r
    6·1 answer
  • When typing in a cell, hitting Tab will bring which result?
    12·2 answers
  • The operating system is not directly involved in one of these tasks.Immersive Reader
    12·1 answer
  • What is the focus of developers interested in the Internet of things?
    11·2 answers
  • What were the technological innovations that allowed for the rapid expansion of the railroads?
    6·1 answer
  • I need help ASAP please and thank you!
    11·1 answer
  • 1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
    14·1 answer
  • To generate a series of first ten counting number of algorithm​
    9·1 answer
  • During the morning of a website launch for a new government sponsored healthcare portal, an unknown political rival, individual,
    15·1 answer
  • During the POST process, the BIOS uses two (2) different ways to notify you of a problem, Error beep codes and error messages, e
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!