1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
8

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts.

After opening one of them he noticed that it's very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?
Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
4 0

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

You might be interested in
When you use a business class with an object data source, the business class Group of answer choices must have attributes that m
DedPeter [7]

Answer: must have public properties that match the names of the bound fields

Explanation:

When a business class is used with an object data source, the business class must have public properties that match the names of the bound fields.

Having an attribute which match the names of the bound fields isn't necessary as well as having a constructor with parameters that match the names of the bound fields

Therefore, the correct option is B.

3 0
3 years ago
Interest assessments are always accurate. True False
Brums [2.3K]

Answer:

False

Explanation:

3 0
4 years ago
Of what is famous Ted Nelson?​
dsp73

Answer:

Nelson proposed a system where copying and linking any text excerpt, image or form was possible.

Explanation:

Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.

How I know:

I goggle it.

8 0
3 years ago
The 8086 was divided into two main parts. The _____ was the "brain" of the processor, and had the ALU, general-purpose register,
jonny [76]

Answer:

1.Execution Unit.  2.Bus interface unit

Explanation:

3 0
3 years ago
Which of these statements is true about database reports? A. A generated report will include all records in the database. B. A g
weeeeeb [17]

B. A generated report will include all records that a query fetches.

6 0
3 years ago
Other questions:
  • When inside a closed work environment, its okay to openly talk with co-workers about PII
    6·1 answer
  • You are given n sorted sequences each one containing n keys. You may assume n is a power of two. We want to merge them into one
    15·1 answer
  • The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
    14·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • Which best describes a hybrid drive?
    11·1 answer
  • Select the correct answer.
    15·1 answer
  • Tell me at list 5 farm animals dieases​
    10·2 answers
  • PLZZZZ help will give brainlest
    5·1 answer
  • Write code that outputs variable numCats. End with a newline.
    6·1 answer
  • What kind of AR target category makes sense for a playing card with a picture on it?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!