1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
9

You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo

rced connections to move to a weak cipher which the attacker can breach. What type of attack is this?
Computers and Technology
1 answer:
Sever21 [200]3 years ago
4 0
Answer: downgrade attack

Explanation: A downgrade attack or version rollback attack is a form of cryptographic attack on a computer system or communications protocol that makes it abandon a high-quality mode of operation in favor of an older, lower-quality mode of operation that is typically provided for backward compatibility with older systems.
You might be interested in
Is a class of software used to meet organization-wide business needs and typically shares data with other enterprise application
yuradex [85]

Answer:enterprise

Explanation:

5 0
1 year ago
Read 2 more answers
Which Traffic Source dimensions does Google Analytics automatically capture for each user who comes to your site?A. Source, Keyw
LenaWriter [7]

For each user who comes to your site the google analytics automatically capture the traffic source dimensions Source, Medium, Campaign name.

<u>Explanation:</u>

Source:

  • There cannot be any reference to a website without an origin source.
  • The source is basically the origin of your traffic such as a search engine (google) or a domain (ex: Twitter).

Medium:

  • Every referral to a website also has a medium along with the source.
  • examples are -:  unpaid search, "cost per click", referral, mail.

Campaign name:

  • The campaign Name is the name referring to the google ads campaign.
5 0
3 years ago
Use the drop down menus to describe how adman can add shapes to his presentation
alina1380 [7]

Answer:

✔ Illustrations

✔ a crosshair

✔ left-click and drag

Explanation:

6 0
3 years ago
Convert the following C program to C++.
ki77a [65]

Answer:

The program equivalent in C++ is:

<em>#include <cstdio></em>

<em>#include <cstdlib></em>

#define SIZE 5

using namespace std;

<em>int main(int argc, char *argv[]) {</em>

<em>int numerator = 25;</em>

<em>int denominator = 10;</em>

<em>FILE * inPut = fopen(argv[1], "r");</em>

<em>FILE * outPut = fopen(argv[2], "w");</em>

<em>float result = (float)numerator/denominator;</em>

<em>fprintf(outPut,"Result is %.2f\n", result);</em>

<em>float arr[SIZE];</em>

<em>for(int i = 0; i < SIZE; i++) {</em>

<em>fscanf(inPut, "%f", &arr[i]);</em>

<em>fprintf(outPut, "%7.4f\n", arr[i]);</em>

<em>}</em>

<em>return 0;</em>

<em>}</em>

Explanation:

See attachment for explanation.

Each line were numbered with equivalent line number in the C program

Download cpp
8 0
3 years ago
Considering all of the time and effort that is put into creating an online business, it is in a merchant’s best interest to make
givi [52]

Search engine optimization will help increase the number of clicks on the business' website and help to drive the sales by targeting the appropriate audience for buying the products.

<h3>What is search engine optimization?</h3>

Search engine optimization, or SEO, is one of the most important functions of the generation of organic clicks on the website for an online ecommerce business.

It helps in creating a brand awareness, the costs of advertising are much lower, and also helps in improving the experience of the customers of ecommerce site.

Hence, the uses of search engine optimization in online business are as aforementioned.

Learn more about Search Engine Optimization here:

brainly.com/question/14850803

#SPJ1

4 0
2 years ago
Other questions:
  • What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
    7·1 answer
  • The ____ provides access to the Internet may also be internal.
    14·2 answers
  • A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
    10·1 answer
  • What does the following loop do?
    5·1 answer
  • Question 19
    9·2 answers
  • 54 points!!! Cyber security
    14·1 answer
  • Which of these are characteristics of a Python data type? Check all that apply.
    11·1 answer
  • 15. You read a news article that's politically biased and not well organized. It's
    6·1 answer
  • you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
    14·1 answer
  • Which of the following is NOT a method for applying the SDLC model?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!