1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
3 years ago
10

A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached

. There, they find a list of customers and use the list to their advantage. Have they hacked your web server
Computers and Technology
1 answer:
Ivan3 years ago
5 0

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

You might be interested in
The purpose of an interface is to:___________
Galina-37 [17]

Answer:

Purpose of the interface

Provides communication − One of the uses of the interface is to provide communication. Through interface you can specify how you want the methods and fields of a particular type.Jul

8 0
2 years ago
What kind of value should an employee possess when employees are expected to be responsible and fair?
WINSTONCH [101]

I'd say professionalism

Professionalism in a workplace setup is acting in a responsible and fair manner in all your personal and work activities. It is always seen as sign of maturity and self-confidence. This work value includes learning every aspect of a job and performing it to the best of your God given ability.

3 0
2 years ago
Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
rusak2 [61]

In python, the sort() function will alphabetically sort a list of strings

3 0
2 years ago
Ashley wants to know the oldest form of both water purification and waste disposal. Help Ashley determine the methods. The oldes
polet [3.4K]

Answer: Distillation and Landfill

Explanation:

Distillation is the old method of water purification, these process involves the separation of compounds or components of a mixture based on their different boiling points. Today we have advanced method of seperation, although Distillation is still being used.

Land fill is one of the oldest form of waste disposal, these method involves digging up a large land mass(depending on the waste to be disposed) and dumping the water into the dugged land mass, then cover it up with the sand that was dugged out. Today, they are more advanced ways to handle wastes such as incinerator.

3 0
3 years ago
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
Other questions:
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Many companies use software to scan resumes and search for _____________.
    10·1 answer
  • On the Insert tab, select Table &gt; _______ to create a table from selected text.
    14·1 answer
  • How do you record yourself on a macbook pro
    9·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • The icon below represents the ____________.
    8·1 answer
  • Plz tell me how to get my deleted account back you will be highly PRAISED!!!!!!!!!!
    14·2 answers
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • Find the output<br>I need it immediately​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!