1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
8

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts.

After opening one of them he noticed that it's very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?
Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
4 0

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

You might be interested in
Ssume the following variables contain the values shown: numberRed = 100 numberBlue = 200 numberGreen = 300 wordRed = "Wagon" wor
brilliants [131]

Answer:

  1. numberRed = numberBlue   = FALSE
  2. numberBlue > numberGreen  = FALSE
  3. numberGreen < numberRed   = FALSE
  4. numberBlue = wordBlue   = ILLEGAL
  5. numberGreen = "Green"   = FALSE
  6. wordRed = "Red"     = FALSE  
  7. wordBlue = "Blue"     = FALSE
  8. numberRed <= numberGreen  = TRUE
  9. numberBlue >= 200    = TRUE
  10. numberGreen >= numberRed + numberBlue = TRUE
  11. numberRed > numberBlue AND numberBlue < numberGreen = FALSE
  12. numberRed = 100 OR numberRed > numberBlue   = TRUE
  13. numberGreen < 10 OR numberBlue > 10     = FALSE
  14. numberBlue = 30 AND numberGreen = 300 OR numberRed = 200 = FALSE

Explanation:

THESE RESULTS ARE VERIFIRED.....

6 0
4 years ago
Windows _____ is a system notification utility and gives quick access to settings for items like screen brightness and network c
jasenka [17]

Answer:

Windows notification and action settings

Explanation:

Notification and action settings is a system settings as well as a notification utility that enables quick or easy access to settings for a number of items or features.

The items include network, tablet mode, mobile hotpot, night light, brightness, Bluetooth, airplane mode, all settings, VPN, focus assist, location, project and connect. It is important to note that all the listed items can be found in the notification and action settings of a windows 10 computer.

4 0
4 years ago
Physical activity such as sports or even a brisk walk can help reduce
ycow [4]
Physical activity could help reduce the chance ofheart disease
4 0
3 years ago
Read 2 more answers
Dynamic addressing: __________.
Anarel [89]

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

6 0
3 years ago
Read 2 more answers
Once Raul selects a technology solution, he has completed the process. <br> a. True<br> b. False
romanna [79]
The answer is true because choosing a technology solution is the last step
7 0
3 years ago
Read 2 more answers
Other questions:
  • Describe mobile computing
    7·1 answer
  • Sarah is creating and formatting a newsletter for her school. Which page layout rules should she consider when doing this?
    13·2 answers
  • Write an examples of Output device, storage devices and inputs device 10 each excluding the common ones​
    5·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • What is the theory of trouble shooting
    10·2 answers
  • Data-as-a-service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
    7·1 answer
  • Why did Herman Hollerith invent the Tabulating Machine?
    10·1 answer
  • How many dog breed are there
    9·2 answers
  • What is the BCC feature used for?
    12·2 answers
  • Write any two merits and demerits of computer​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!