1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KatRina [158]
3 years ago
7

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor

mation or gather credentials that can be used to extend the attack?
Computers and Technology
1 answer:
Alex_Xolod [135]3 years ago
4 0

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

You might be interested in
Round 74,361 to the nearest 10​
grandymaker [24]

Answer:

74,400 i think

Explanation:

8 0
3 years ago
Suppose we can buy a chocolate bar from the vending machine for $1 each. Inside every chocolate bar is a coupon. We can redeem s
Tanya [424]

Answer and Explanation:

Using JavaScript:

/* program should take N input which represents the dollar amount and output how many chocolate bars and how many coupons we have*/

function chocolatebar(dollars){

var dollaramt= dollars;

var i;

for(i=0; i <= dollaramt; i++){

i=i+6

?

Alert ("you have 1 extra chocolate bar");

:

Alert ("keep buying chocolate bars to get more coupons for a bonus chocolate bar")

}

}

*

7 0
3 years ago
Importance of software in computer
Juli2301 [7.4K]

Answer:

Computer hardware is virtually useless without computer software. Software is the programs that are needed to accomplish the input, processing, output, storage, and control activities of information systems.

Explanation:

4 0
3 years ago
Read 2 more answers
In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second frame
DerKrebs [107]

Answer:

There could be a collision if a hidden node problem occurs.

Explanation:

CSMA/CA(carrier sense multiple access/ collision avoidance) is a multiple access method in wireless networking, that allows multiple node to transmit. Collision avoidance of this method is based on preventing signal loss or downtime as a result of collision of transmitting multi signals.

If a node at step 4(transmit frame) sends the first frame, the node still needs to send a RTS(request to send) and to receive a Clear to send (CTS) from the WAP, the is to mitigate the issue of hidden node problem as all frame are treated as unit, so other listening nodes, not detected would seek to connect and transmit as well.

5 0
3 years ago
What is one of the key components of a typical formula?
hoa [83]

A formula key components are:

  • Functions
  • References
  • Operators
  • Constants.

<h3>What is a formula?</h3>

This is known to be a kind of mathematical relationship or rule that is said to be expressed in form of symbols.

Therefore, A formula key components are:

  • Functions
  • References
  • Operators
  • Constants.

Learn more about formula from

brainly.com/question/2005046

#SPJ11

4 0
2 years ago
Other questions:
  • Propose, two new, proudly South African ways, which you can visualize that the internet of things, can be used in at work to mak
    7·1 answer
  • When using an online media source, students should ensure the information is
    13·2 answers
  • Where could an identity theft access your personal information
    9·2 answers
  • Help ASAP
    5·2 answers
  • 1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
    10·1 answer
  • You are attempting to upgrade a Windows Server 2008 R2 server to Windows Server 2016 Standard. What must be done in order to acc
    5·1 answer
  • Who is the father of computer?​
    6·1 answer
  • Which of the following are ways that
    9·1 answer
  • Software that displays advertising material when online.
    12·2 answers
  • You have a computer that runs on a windows 10 operating system and supports modern sleep. what will happen if you close the lid
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!