1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
4 years ago
5

Your network admin notifies you of an attack that had occurred on your network recently. They tell you that the log reports that

many attempts over a long time were made at the network password until it was eventually cracked. What type of attack best describes what happened
Computers and Technology
1 answer:
Colt1911 [192]4 years ago
7 0

Answer:

Replay

Explanation:

A replay attack is an attack on network in which there is malicious or fraudulent repetition or delay in transmitting valid data. This is done by an originator who initially obstructs data before re-transmitting it.

Replay attack helps hackers to have access to information stored and protected on a network.

Hackers uses replay attack to duplicate transaction and withdraw money from people's account.

Replay attack is also known as playback attack, it is a cyber attack.

You might be interested in
Is it true or false and incomplete doing can be saved in Paint​
klasskru [66]
True is the answer to this
6 0
3 years ago
A sequence of direct connections
stealth61 [152]

Explanation:

Es tut mir nicht so leid

5 0
3 years ago
What does ascii stand for?
tamaranim1 [39]
ASCII—American Standard Code for Information Interchange
7 0
3 years ago
Read 2 more answers
Also known as the hard disk, the ______ is the primary storage device of a personal computer. You can also buy an external _____
Stolb23 [73]

Another name for hard disk is called; Hard Drive

The external hard disk is called; External Hard drive

<h3>Computer storage devices</h3>

In computers there are different ways of storing information and all could come under the name drives but the primary storage of a computer which is called hard disk is also called hard drive.

Now, the hard drive could be internal or external and so the one to store additional information is called External Hard Drive.

Read more about Computer Storage Devices at; brainly.com/question/19667078

5 0
2 years ago
In response to a recent outbreak of computer viruses, Babbage Industries, a large technology company, installs computer virus pr
Vinil7 [7]

Answer:

The answer is antivirus solution implementation and planning.

Explanation:

Enterprises use antivirus implementation to protect from threats of different types such as Trojan horses, rootkits, ransomware, spyware, and botnets. Withing organizations, this implementation requires a proper planning and implementation plan that helps companies to protect the enterprise system. So, antivirus implementation and planning is the answer.

8 0
3 years ago
Read 2 more answers
Other questions:
  • This question involves the creation of user names for an online system. A user name is created based on a user’s first and last
    13·1 answer
  • Where do you go to create a workbook?​
    8·1 answer
  • The rules that determine what is allowed in a program are known as the
    14·1 answer
  • How many words fit on a double-spaced page?
    11·1 answer
  • A small bank with several regional branches is searching for a solution to consolidate its business services into a single site
    8·2 answers
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • If the executives for Office Max LLC, a chain of office supply stores, developed the chain's objectives by asking buyers and sto
    11·1 answer
  • Write a short note on Computer<br>impact on<br> our society?​
    7·2 answers
  • Serena, an analyst at an environmental agency, wants to prepare a report using data from the Car Emissions database.
    11·2 answers
  • confidentiality ensures that only those with the rights and privileges to access information are able to do so.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!