1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
13

A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrato

r, however, does not see any suspicious processes running. A prior technician's note indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently. Which of the following is the most likely cause of this behavior?
Crpto-malware

rootkit

logic bomb

session hijacking
Computers and Technology
1 answer:
elena-s [515]3 years ago
8 0

Answer: Session Hijacking

Explanation:Session hijacking is the attacking activity that threats the valid session of the computer. This attack also invokes the system with unauthorized access for hacking the information and other processes.

Other options are incorrect because crpto-malware is the ransomware that demands ransom for data encrypted by the hackers, rootkit  permits the authorized access in system without getting noticed and logic bomb is a malicious code to harm the program computing. Thus, the correct option is session hijacking.

You might be interested in
Web browsers are used to browse the world wide web.
VikaD [51]
No its actually used for looking up concerns, questions, or rumours
3 0
4 years ago
Read 2 more answers
WILL MARK BRAINLIEST FOR ANYONES ANSWER!
Anvisha [2.4K]

Answer:

just know that bit gonna be running when I make mine Imma have 720 fps btw today sponsored is nord VPN

4 0
3 years ago
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
(1) Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the arr
Mashutka [201]

Answer:

weights = []

total = 0

max = 0

for i in range(5):

   weight = float(input("Enter weight " + str(i+1) + ": "))

   weights.append(weight)

   total += weights[i]

   if weights[i] > max:

       max = weights[i]

average = total / 5

print("Your entered: " + str(weights))

print("Total weight: " + str(total))

print("Average weight: " + str(average))

print("Max weight: " + str(max))

Explanation:

Initialize the variables

Create a for loop that iterates 5 times

Get the values from the user

Put them inside the array

Calculate the total by adding each value to the total

Calculate the max value by comparing each value

When the loop is done, find the average - divide the total by 5

Print the results

6 0
3 years ago
All of the following are organization habits except:
atroni [7]
A. multitasking 
the rest of them are 

6 0
3 years ago
Other questions:
  • Use this illustration to answer the question.
    15·1 answer
  • Does anyone know how to use a green screen
    8·1 answer
  • Pressing the _____ key when entering title text in a placeholder creates a new paragraph. BACKSPACE SHIFT DELETE ENTER
    5·1 answer
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • Write fade in shorthand​
    11·1 answer
  • Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
    8·1 answer
  • 100 POINTS PLEASE HELP Type the correct answer in the box. Spell all words correctly.
    15·1 answer
  • What note for percussun is this??
    12·1 answer
  • Large and powerful computer capable of processing and storing large amounts of business data
    5·1 answer
  • Write, compile, and test the MovieQuoteInfo class so that it displays your favorite movie quote, the movie it comes from, the ch
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!