1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
12

In an attack known as ____, valid protocol packets exploit poorly configured dns servers to inject false information to corrupt

the servers' answers to routine dns queries from other systems on that network. a. denial-of-service (dos) b. port mirroring c. dns cache poisoning d. evasion
Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

This is known as DNS poisoning, so called because it 'poisons' the entries of the DNS with false information.

You might be interested in
What does computer graphics mean?​
barxatty [35]

Answer:Computer graphics involves display, manipulation, storage of images, and experimental information for proper visualization.

( or you can say )

the products of the graphic arts, especially commercial design or illustration.

Explanation: <3

5 0
3 years ago
The main activity area or the brain of the computer is called the ________
Darya [45]

Motherboard

Its a computer chip



6 0
3 years ago
Which teamwork characteristic motivates your team members to perform better?
scoundrel [369]
Maybe Encouragement? I don't know, are there any choices to choose from?
4 0
3 years ago
Read 2 more answers
The part of a screen that holds its own document or message.
scZoUnD [109]
The icons is the answer
8 0
3 years ago
Which term below refers to the overall design intended to convey an idea or feeling that is appealing to the site's target
Usimov [2.4K]

Answer:

Theme

Explanation:

An idea that recurs in or pervades a piece of work

8 0
3 years ago
Read 2 more answers
Other questions:
  • What percentage of the global population of about seven billion people used the Internet in 2012?
    5·2 answers
  • Plz answer me will mark as brainliest ​
    7·2 answers
  • Give two differences between a source and an object program​
    10·1 answer
  • Select all that apply.
    9·1 answer
  • If the last digit of a 2's complement binary number is 0, then the number is even. If the last two digits of a 2's complement bi
    7·1 answer
  • Answer the following questions based on your readings from Module 1. Describe a time when you or someone you observed showed a p
    9·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • Cuál es el objetivo principal de una clave primaria?
    14·1 answer
  • Choose the missing words in the code below.
    12·1 answer
  • Hypertext enables you to navigate through pieces of information by clicking the __________, that connect them.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!