1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
7

Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?

Computers and Technology
1 answer:
tatuchka [14]3 years ago
8 0

Answer:

An HTTP Header attack

Explanation:

In web applications an HTTP refers to Hypertext Transfer Protocol and an HTTP Header is the value that is displayed in  a request or response message, the header has a name and a value separated by a colon.

An HTTP header attack called an header injection is a vulnerability that is present when users' inputs are required for the dynamic generation of HTTP headers. This vulneraility allows several security threats to be carried out, some examples are:

  1. Malicious site redirection
  2. Cross-site scripting, and
  3. Session fixation through the set-cookie header
You might be interested in
The list method reverse reverses the elements in the list. Define a function named reverse that reverses the elements in its lis
Alisiya [41]

Answer:

public class Reverse {

  1.    public static void reverseList(int list [], int n)
  2.    {
  3.        int[] reversedList = new int[n];
  4.        int k = n;
  5.        for (int i = 0; i < n; i++) {
  6.            reversedList[k - 1] = list[i];
  7.            k = k - 1;
  8.        }
  9.        //printing the reversed list
  10.        System.out.println("The Reversed list \n");
  11.        for (int j = 0; j < n; j++) {
  12.            System.out.println(reversedList[j]);
  13.        }
  14.    }

Explanation:

Using Java, An array is implemented to hold a list of items

A method reverseList() is created to accept an array as parameter and using a for statement reverses the elements of the array and prints each element of the list

See below a complete code with a main method that calls this method

<em>public class Reverse {</em>

<em>    public static void main(String[] args) {</em>

<em>        int [] arr = {10, 20, 30, 40, 50};</em>

<em>        reverseList(arr, arr.length);</em>

<em>    }</em>

<em>    public static void reverseList(int list [], int n)</em>

<em>    {</em>

<em>        int[] reversedList = new int[n];</em>

<em>        int k = n;</em>

<em>        for (int i = 0; i < n; i++) {</em>

<em>            reversedList[k - 1] = list[i];</em>

<em>            k = k - 1;</em>

<em>        }</em>

<em>        //printing the reversed list</em>

<em>        System.out.println("The Reversed list \n");</em>

<em>        for (int j = 0; j < n; j++) {</em>

<em>            System.out.println(reversedList[j]);</em>

<em>        }</em>

<em>    }</em>

<em>}</em>

7 0
3 years ago
___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-t
Tomtit [17]

Answer:

Crytocurrency

Explanation:

8 0
2 years ago
Read 2 more answers
Pls help ...
dedylja [7]

Answer:

  • You open the class, and print sleep after thread 3000
  • So A
8 0
3 years ago
Unwanted emails are called:malware,phishing, spam or virus
Colt1911 [192]
1. Spam
2. Phishing
3. True
3 0
3 years ago
The height of a small rocket y can be calculated as a function of time after blastoff with the following piecewise function: y 5
SOVA2 [1]

Answer:

High level Language

understand

Explanation:

rocket is 0...4433456u888

5 0
2 years ago
Other questions:
  • Hard drives are usually self-contained, sealed devices. Why must the case for the hard drive remain sealed closed?
    8·1 answer
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • Digital libraries are often available to students and/or employees at colleges, schools, and BLANK institutions.
    15·1 answer
  • What does email etiquette mean?
    14·1 answer
  • A system administrator is selecting an operating system for use by the company’s research and development team. The team require
    15·1 answer
  • Use the drop-down tool to select the word or phrase that completes each sentence.
    7·1 answer
  • Which of the following are acceptable to share? Check all of the boxes that apply.
    13·1 answer
  • Choose the best collection for each situation.
    8·1 answer
  • Where are all my smart ppl at? Help me out!!!
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!