1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
4 years ago
7

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________

. phishing pretexting polymorphing pharming?
Computers and Technology
2 answers:
Levart [38]4 years ago
4 0

Answer:

The answer is Pharming.

Explanation:

  • When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming.
  • Hacker installs virus on your computer which manipulates the host files on your computer.
  • The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.
  • These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.
tresset_1 [31]4 years ago
3 0
The answer is Phishing
You might be interested in
A chief Information Security Officer (CISO) is performing a BIA for the organization in case of a natural disaster. Which of the
nataly862011 [7]

Answer:

The correct answer is option (D) Identify the impact on safety of the property

Explanation:

Solution

In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.

Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take  away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is  doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.

Example of property can be software, equipment, facilities, company’s assets.

4 0
3 years ago
Create a server program and a client program. The client program reads a line from a text file, converts everything to upper cas
Tema [17]

Answer:

Explanation:

Find the both server and client files attached below.

Download txt
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> txt </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> txt </span>
4 0
3 years ago
_________ local variables retain their value between function calls.
SOVA2 [1]

Answer: static

Explanation:

variables when declared static gets called statically meaning whenever a function call is made it get stored and it is not required to get the variable again when the function is again called. There scope is beyond the function block

4 0
3 years ago
Many people describes computers as complex machine. what can this mean?
Airida [17]
They work in many different ways?
8 0
4 years ago
Which of the following services provides hardware, an operating system, and a database management system (DBMS) on a cloud-based
Amanda [17]

Answer:

Infrastructure as a service(Iaas)

Explanation:

Infrastructure as a service(Iaas) is used to provide hardware,storage,servers and datacenter space or network components

4 0
3 years ago
Other questions:
  • Which of the following translates packets so that the node can understand them once they enter through a port?
    8·2 answers
  • Which commas is used to combine two or more cells together into one cell
    11·1 answer
  • Jamie has to enter the names, grades, and scores of a group of students into a worksheet. Which option will Jamie use to describ
    11·2 answers
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    15·1 answer
  • 10 points!
    12·1 answer
  • Peripeteia is also referred to as __________.
    5·2 answers
  • If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
    11·1 answer
  • A _ is the acknowledgment of a potential noncomformity, or an opinion regarding an issue that is not covered by a standard
    6·1 answer
  • How have these advances in-home technology changed the role of technicians in our society?
    10·1 answer
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!