1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
12

In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt

the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion
Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

You might be interested in
: how can you reduce file size so that files can be sent more efficiently across the internet
Rina8888 [55]
You can compress them. ZIP is the most well known protocol.
8 0
3 years ago
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
Sunny_sXe [5.5K]
It is application software
6 0
2 years ago
Combination of star topology and star topology can consider as hybrid?​
Ad libitum [116K]

Answer:

no

Explanation:

A hybrid topology is a type of network topology that uses two or more differing network topologies. These topologies can include a mix of bus topology, mesh topology, ring topology, star topology, and tree topology.

4 0
3 years ago
Which of the following statements is true about scalability? Choose 3 options.
Simora [160]

Answer:

4, 5, 2

Explanation:

just did it on edge :)

3 0
3 years ago
Read 2 more answers
What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
valentina_108 [34]

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

6 0
3 years ago
Read 2 more answers
Other questions:
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • Where will the CPU store data for easy access and quick retrieval during these computations?
    13·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
    15·1 answer
  • Interruption attacks are also called ___ attacks:
    8·1 answer
  • What do people do when they navigate using GPS
    6·2 answers
  • Write a function in Java to implement the following logic:
    13·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
  • Hilarious error messages
    10·2 answers
  • Which of the following best describes a hotspot as
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!