1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
12

In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt

the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion
Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

You might be interested in
What command can you use if you accidentally delete a sentence in your document?
damaskus [11]

Answer:

undo

Explanation:

or ctrl z

hope this helps

6 0
2 years ago
Read 2 more answers
Heeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeelp pt.3
Luda [366]

Answer:

i guess option 1

5 0
2 years ago
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
2 years ago
Which of the following is the largest measurement for the weight of a bag of dog food?
jasenka [17]

Answer:

approximately 5 lbs but no sure weight.

6 0
2 years ago
Read 2 more answers
Secondary storage is also known as the ‘main memory’
valentinak56 [21]

Physical memory

Main memory refers to physical memory that is internal to the computer.

3 0
2 years ago
Other questions:
  • This type of connection uses radio waves to connect devices on a network.
    9·2 answers
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • What is the primary purpose of the software package offered by hyper-v called guest integration services?
    15·1 answer
  • Moderate changes to existing processes falls under the _________ analysis. Business Process Automation (BPA) Business Process Im
    5·1 answer
  • What is random access memory?
    6·2 answers
  • Create and test a user-defined function named ufnFullName that combines the values of the two parameters named FirstName and Las
    15·1 answer
  • anyone got a class named computer literacy? or sum similar to using Microsoft programs? i need a lotttt of help, im 3 units behi
    12·2 answers
  • When I click on someone who asked a question and i want to see there answer it is always blurred and when I asked a question I c
    8·1 answer
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!