1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mojhsa [17]
3 years ago
8

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts.

After opening one of them he noticed that it's very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?
Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
4 0

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

You might be interested in
Which are Career and Technical Student Organizations? (Check all that apply.)
ivolga24 [154]

Answer: BPA (Business Professionals of America)

DECA (formerly Distributive Education Clubs of America)

Educators Rising.

FBLA-PBL (Future Business Leaders of America-Phi Beta Lambda)

FCCLA (Family, Career, and Community Leaders of America)

FFA (formerly Future Farmers of America)

Explanation: these are all i cant think of at the moment. sorry! but i hope this helps :)

4 0
3 years ago
Waterpower was first harvested by ancient societies using
Maslowich
Not sure why this question is in Computers and Technology...

Answer should be c.
6 0
3 years ago
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​
irakobra [83]

Answer:

participle is singing

word it modifies is voice

4 0
3 years ago
What is one effective way for employees to keep their skill-sets current
natta225 [31]
Is it a multiple choice answer? if so would like to see the answers as there are TONS of effective ways and if i list one it may not be in that list you have if its multiple choice.
3 0
3 years ago
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user
bixtya [17]

Answer:

B

Explanation:

An authentication server server tracks who is logging on to the network as well as which services on the network are available to each user. It also does the job of providing a network service that applications can use to authenticate the credentials, that are oftentimes account names and passwords, of their users. Authentication server is also used as the basis for authorization.

4 0
2 years ago
Other questions:
  • Attacker player X is standing still on a corner kick, as the ball is played, he jumps up with his arms flailing above his should
    8·1 answer
  • To create a digital file from an old photo, I would use a _____.
    10·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • What is the output after running the following code snippet? int number = 600; if (number < 200) { System.out.println("Low sp
    15·1 answer
  • For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
    14·1 answer
  • True or false? Compared to verbal language a shot is like a word
    12·1 answer
  • Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story.
    14·1 answer
  • Do you remember your first 3D movie experience? What was the movie, what was the experience like, and why was it memorable? (If
    7·1 answer
  • 1. Which of the following cables are used in networking? Check all that apply.
    8·2 answers
  • Software is in -----language​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!