1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sleet_krkn [62]
3 years ago
14

Choose the type of attack that is based on entering fake information into a target network domain name server?

Computers and Technology
1 answer:
SSSSS [86.1K]3 years ago
4 0

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

You might be interested in
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The numbe
AnnyKZ [126]

Answer:

r = 1

Explanation:

Average processing time ( p ) = 3 minutes

Average inter-arrival time ( a ) = 3 minutes

number of servers ( m ) = 3

<u>Determine the value of r </u>

r ( offered load ) = p/a

                          = 3 / 3  = 1

∴ value of r ( offered load ) = 1

3 0
3 years ago
Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
Vikki [24]

Answer:

B. Create a unique External ID field on Accounts in SFDC for matching.                                      

Explanation:

  • External ID is used to prevent duplicate records from being created as a consequence of the import operation, when importing custom objects or person accounts.
  • An external ID is a specific field that contains the External ID attribute.
  • External ID has unique record identifiers from a system that is outside the Salesforce.
  • When this option is selected Data Import Wizard identifies existing Salesforce records with external IDs that match the values in import file.
  • The External ID field enables to keep unique record IDs from an external system, usually for integration.
  • External ID field values should be unique and determine whether or not value are case sensitive can also be determined. For example XYZ and xyz will not be considered same if case sensitive option is not selected.

6 0
3 years ago
At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities a
Anon25 [30]

Answer:

Tactical Level

Explanation:

Based on the information provided within the question it can be said that the level of the organization that is being mentioned is called the Tactical Level. In this level managers focus choosing the tactics depending on the information that they gather from everyday operational activities. This information is later sent to the higher levels of the organization.

7 0
3 years ago
Read 2 more answers
Create a new folder in python and make it read only
igor_vitrenko [27]
Making the file read-only will not allow the file to be rewritten again. For this, we need to modify the permissions of the file. To achieve this, we will make use of the os module in Python more specifically, the chmod() of the os module.

The coding part is extremely simple and will contain very few lines as we are not doing much but changing the permissions. Using the chmod(), we can change the mode of the path, setting it to any mode using the suitable flags from the stat module. Both these modules come inbuilt with Python and hence you need not install anything additionally.

The entire code to change the file to read-only is as follows;

import os
from stat import S_IREAD
# Replace the first parameter with your file name
os.chmod("sample.txt", S_IREAD)
.

You can verify if the code was executed correctly by checking the file’s permissions. To do that :

Right-click on the file and click properties.
Under the attributes section, you will find the read-only checkbox checked.
I hope you found this article useful and it helped you make a file read-only. You can do more than just making the file read-only by using the appropriate flag from the stat module.
8 0
3 years ago
Other questions:
  • When looking at an object or process to code, it is important to think of as general a solution as possible and consider all the
    13·1 answer
  • The 169.254.78.9 ip address is an example of what type of ip address
    6·1 answer
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • categorize each job role as an administrative job or management job auditor director legal secretary payroll clerk etc ​
    8·1 answer
  • Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
    6·1 answer
  • Write a program called array1.cpp file that use either regular for loop or range based for loop to display the contents of the a
    14·1 answer
  • Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
    7·1 answer
  • The following pieces are known as (image shown above)
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!