1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaVladis [17]
3 years ago
10

Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?

(A) DLL injection (B) DDoS attack (C) DNS poisoning (D) ARP poisoning
Computers and Technology
1 answer:
lilavasa [31]3 years ago
6 0

Answer: C) DNS poisoning

Explanation: DNS poisoning or DNS cache poisoning is the type of attacking tendency towards the URL of the computer. These attempt to attack the URL using the spam mails and the user usually end up clicking on the URL provided by the attacker which invokes attack in the computer.

This mechanism takes place in the emails as well as the selected websites which can be accessed by the users easily.These attacks once enter the system seems like the real thing and become prone to many risks .

You might be interested in
A red wavy line under a word means _____. a change has been made in the text a new word was inserted in the document there is a
zloy xaker [14]
Hi there!

The correct option is C. <span>there is a spelling mistake. The red wavy line indicates that a word was spelled incorrectly, sometimes though this function does not recognize the word it can mark it as incorrect even when it is not, in which case you can right-click the marked word and add it to your computer's internal word dictionary. Right-clicking an incorrectly spelled word will also give a short list of words that are similar to the one you are trying to spell, clicking on one of the given words will automatically change the marked word to the one you chose.

-Your friend, ASIAX</span>
7 0
3 years ago
Read 2 more answers
Choose the correct term to complete the sentence.
Diano4ka-milaya [45]

Answer:

Object-oriented programming

Explanation:

When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).

6 0
2 years ago
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
2 years ago
Read 2 more answers
. Briefly describe an SQL DML statement for changing existing data in a table.
bearhunter [10]

Answer:

The Update statement in the DML is used for changing existing data in a table.

Explanation:

Their are following Sql statement in the DML.

Insert

This SQL statement is used for inserting data into the table.

select

This SQL statement is used for retrieving data from database  

update

This SQL statement is used for updating data in a table.

delete

This SQL statement is used for delete data from database .

The "UPDATE" SQL statement in DML is used for Modify the data in the existing table .

Following are the syntax of Update SQL query

Update tablename

set column1=value1,column2=value2............column N=valueN

Where condition;

Example :Suppose we have student table and (rollno,name,age and add) are the field for that table we have to change the address of rollno 105

Then we use update query like that

UPDATE STUDENT

SET add='kalam nagar'

where rollno=105;

8 0
3 years ago
&gt;What is the output of the following code:
ozzi

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

5 0
2 years ago
Other questions:
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • Assume the following JavaScript program was interpreted using staticscoping rules. What value of x is displayed in function sub1
    12·1 answer
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • Your baby brother has found the hammer and is eagerly eyeing one of the boxes. Describe and analyze an algorithm to determine if
    15·1 answer
  • Which key should you press and hold to select multiple cells?
    8·2 answers
  • WILL UPVOTE ALL
    10·1 answer
  • Which programming element is used by a game program to track and display score information
    12·2 answers
  • How many of yall are willing to subscribe to my channel called "Space Juice" with around 245 subs?!​
    8·1 answer
  • Brainly not working for me not showing any ads or answers
    5·2 answers
  • We can save our data peremently on a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!