1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
12

In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt

the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion
Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

You might be interested in
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the
puteri [66]

Answer:

Encrypt this binary string into ciphertext: 110000. Include

in your answer the formula the decoder would use to decrypt your cipher text in the format (coded answer) x N mod (m) = Y

-Decrypt this ciphertext into a binary string: 106

Now that you can see how public and private keys work in a real-world scenario, please explains how it works for computers and internet communications in relation to cybersecurity.

Explanation: ……………..

6 0
3 years ago
When designing a laptop, which three things should designers think about?
FromTheMoon [43]

Answer:B,C,D

Explanation:

7 0
3 years ago
Does virtualization impact the design of programs on behalf of the process/threading model?
zaharov [31]

Answer:

 Virtualization is the process which refers to the isolating the various computing resources that basically run without depend on the particular platform in the environment.

The virtualization basically allow the various application like software and hardware that mainly used to connect different types of server and storage applications.

The virtualization impact while designing the program is that it helps in the program execution process and also reducing the impact by using the hardware virtualization support in the system. The thread system also maintain the virtualization impact while designing.

7 0
4 years ago
I was designed to meet the computing needs of an individual. I was originally referred to as ___________________.
slamgirl [31]
C) microcomputers
explanation: designed for computing needs of an individual
6 0
3 years ago
Who is Majira Strawberry??? My Friend said it so i am wondering
otez555 [7]

Answer:

he/ she is a furry

6 0
3 years ago
Read 2 more answers
Other questions:
  • Discuss how advertising on the Web affects search results and the ethical dilemmas associated with it.
    5·1 answer
  • Sensitive security information can be shared with whom
    13·2 answers
  • Janice is making her resume in which section should she include information about her previous employers , positions held , and
    15·1 answer
  • "Find the sum of the squares of the integers from 1 to MySquare, where MySquare is input by the user. Be sure to check that the
    9·1 answer
  • Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
    11·1 answer
  • Any action that causes harm to your computer is called a
    15·1 answer
  • ITING THE ANSWER
    9·1 answer
  • What is a common misconception about Agile and DevOps?
    9·1 answer
  • What does this mean startUp()
    13·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!