1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
14

Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant

ivirus software loads?
Computers and Technology
1 answer:
Ber [7]3 years ago
5 0
I believe it is referred to as 'rootkit'
You might be interested in
Which type of network involves buildings in multiple cities connecting to each other?
NeX [460]

Answer:

Power lines

Explanation:

Because their everywhere

4 0
3 years ago
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at t
lina2011 [118]

Answer:

C) Session Layer.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Basically, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Session layer is the layer of an Open Systems Interconnection (OSI) model which describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

3 0
2 years ago
10. What is "bandwidth"? (
natali 33 [55]

Answer:

ELECTRONICS

a range of frequencies within a given band, in particular that used for transmitting a signal.

2.

the energy or mental capacity required to deal with a situation.

Explanation:

6 0
3 years ago
Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understandin
Mars2501 [29]

Since Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard, the attacks that is related to encrypted wireless packets is option A: IV attacks.

<h3>Describe an IV attack.</h3>

A wireless network attack is called an initialization vector (IV) attack. During transmission, it alters the IV of an encrypted wireless packet. One packet's plaintext can be utilized by an attacker to calculate the RC4 key stream produced by the IV employed.

Note that A binary vector used to initialize the encryption process for a plaintext block sequence in order to boost security by adding more cryptographic variance and to synchronize cryptographic hardware. The initialization vector is not required to be kept secret.

Learn more about Wi-Fi Protected Access  from

brainly.com/question/13068630
#SPJ1

See full question below

Wi-Fi Protected Access (WPA) fixes critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard. Understanding that WPA uses a combination of an RC4 stream cipher and Temporal Key Integrity Protocol (TKIP), this makes a wireless access point NOT vulnerable to which of the following attacks when related to encrypted wireless packets?

IV attacks

Malware

Ransoware

5 0
1 year ago
If AL contains binary 1000 1111, which one will show the information of the binary bits in AL after performing operation SHR AL,
padilas [110]

Answer:

a) AL will contains 0011 1100

Explanation:

In assembly language, shifting bits in registers is a common and important practice. One of the shifting operations is the SHR AL, x where the x specifies that the bits be shifted to the right by x places.

SHR AL, 2 therefore means that the bits contained in the AL should be shifted to the right by two (2) places.

For example, if the AL contains binary 1000 1111, the SHR AL, 2 operation will cause the following to happen

Original bit =>                                        |   1  |  0 |  0  |  0  |  1 |  1 |  1 |  1 |

Shift once to the right =>                |  1 |   0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) |

Shift once to the right =>          |  1 |  0 |  0  |  0  |  1 |  1 |  1 |  1 | (0) | (0) |

Notice;

(i) that there are two shifts - one at a time.

(ii) that the bits in bold face are the bits in the AL after the shift. Those that in regular face are those in the carry flag.

(iii) that the new bits added to the AL after a shift are the ones in bracket. They are always set to 0.

5 0
3 years ago
Other questions:
  • Many web browsers, including internet explorer, edge, chrome, and safari, have a(n) ____ option to browse the web without leavin
    12·2 answers
  • What is the protocol that is used between a web browser and web server at the transportation layer?
    13·1 answer
  • Why are advanced features helpful when businesses use spreadsheets
    5·1 answer
  • In Python, arrays are usually reserved for
    12·1 answer
  • _____ are independent and not associated with the marketing efforts of any particular company or brand.​
    9·1 answer
  • Difference between ancient and modern mode of information <br> transmission
    12·1 answer
  • Como se diseña y produce un material audiovisual
    5·1 answer
  • What is the main difference between the ICD-10 annual revision released by the WHO and the ICD-10-CM/PCS annual revision release
    11·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
  • Social media first became popular due to which development?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!