1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
12

In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt

the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion
Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

You might be interested in
A keyboard shortcut is a key or combination of keys that you press to access a feature or perform a command. ___________________
andrey2020 [161]
I believe that this is true.
Ctrl+F
Ctrl+C
Ctrl+V
These are all keyboard shortcuts.

8 0
3 years ago
A student has a ten-year-old desktop computer that she only uses for word processing, but she would like to start using it to pl
kondaur [170]

Answer:

1- Replace, 2- Upgrade

Explanation:

I just took the test Hopefully this helps you guys! :)

4 0
3 years ago
Data owners ensure that only the access that is needed to perform day-to-day operations is granted and that duties are separated
Akimi4 [234]

Answer:

True

Explanation:

As employees might be accessing business/client data, security of data access is a topmost priority.

8 0
3 years ago
true or false, the random number generator (data analysis tool) requires you to copy paste special value in order to create stat
Vladimir79 [104]

The random number generator (data analysis tool) requires you to copy paste special value in order to create static random value(s) is a false statement.

<h3>What is the meaning of random number?</h3>

A random number is a pick of a number made seemingly at random from a certain distribution such that the distribution is reproduced when a large collection of these numbers is chosen. Such numbers must almost always be independent in order to prevent relationships between succeeding numbers.

Therefore, a hardware or software algorithm known as a random number generator produces numbers at random from a finite or infinite distribution. Pseudo-random number generators and real random number generators are the two primary varieties of random number generators.

Learn more about random number generator from

brainly.com/question/10352102
#SPJ1

8 0
9 months ago
Anyone wanna join a supercar/hypercar enthusiast's club?
stellarik [79]

Answer:

I have Lamborghini Centenario as my profile pic. :)

Explanation:

7 0
3 years ago
Other questions:
  • In a program, you need to store the identification numbers of 10 employees (as integers) and their weekly gross pay (as double v
    14·1 answer
  • Dustin runs a command at the command line trying to find out what kernel version the system is running. However, it doesn't give
    12·1 answer
  • Which part of the computer contains logic circuity which interrupts instructions from a program​
    15·1 answer
  • my airpods just do not seem to connect if i try to pair them, reset them, they have this continuous green light, please help me
    12·1 answer
  • " In which software generation did the distinction between systems programmers and other programmers first surface?"
    15·1 answer
  • Which of these would NOT be a valid Internet Control Message Protocol (ICMP) error message:
    6·1 answer
  • How do you merge on excel?​
    5·1 answer
  • What is the meaning of url <br>​
    7·1 answer
  • Giving brainliest to the Person finishes this song lyric.
    7·2 answers
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!