1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
7

Identify the web application attack where attackers exploit webpage vulnerabilities to force an unsuspecting user’s browser to s

end malicious requests they did not intend. The victim holds an active session with a trusted site and simultaneously visits a malicious site, which injects an HTTP request for the trusted site into the victim user’s session, compromising its integrity
Cross-Site Scripting (XSS)
Cross-Site Request Forgery (CSRF)
LDAP Injection attack
SQL injection attack
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
8 0

Answer:

Cross-Site Request Forgery (CSRF)

Explanation:

  • Cross-Site Request Forgery ( CSRF ) is an attack in which the attacker tricks the user into making malicious requests.
  • In this kind of attacks, the victims sends the unwanted, malicious HTTP requests ( GET requests and POST requests) to a website.
  • As the name itself (CSRF) suggests, it involves forging the identity of the user and the attacker make malicious requests on the website.  
  • The CSRF attacks also facilitates another attack called Croos-site Scripting (XSS).
  • The two types of preventing methods for CSRF attacks are (a) Using Anti - CSRF Tokens (b) Preventing sending the cookies.
You might be interested in
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
#include
gavmur [86]

Answer:

See explaination

Explanation:

#include <fstream>

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

// Fill in the code to define payfile as an input file

ifstream payfile;

float gross;

float net;

float hours;

float payRate;

float stateTax;

float fedTax;

cout << fixed << setprecision(2) << showpoint;

// Fill in the code to open payfile and attach it to the physical file

// named payroll.dat

payfile.open("payroll.dat");

// Fill in code to write a conditional statement to check if payfile

// does not exist.

if(!payfile)

{

cout << "Error opening file. \n";

cout << "It may not exist where indicated" << endl;

return 1;

}

ofstream outfile("pay.out");

cout << "Payrate Hours Gross Pay Net Pay"

<< endl << endl;

outfile << "Payrate Hours Gross Pay Net Pay"

<< endl << endl;

// Fill in code to prime the read for the payfile file.

payfile >> hours;

// Fill in code to write a loop condition to run while payfile has more

// data to process.

while(!payfile.eof())

{

payfile >> payRate >> stateTax >> fedTax;

gross = payRate * hours;

net = gross - (gross * stateTax) - (gross * fedTax);

cout << payRate << setw(15) << hours << setw(12) << gross

<< setw(12) << net << endl;

outfile << payRate << setw(15) << hours << setw(12) << gross

<< setw(12) << net << endl;

payfile >> hours ;// Fill in the code to finish this with the appropriate

// variable to be input

}

payfile.close();

outfile.close();

return 0;

}

4 0
3 years ago
Value: 3
Citrus2011 [14]

Answer:

B - A word is correctly spelled but is used incorrectly in a document

4 0
3 years ago
A friend of yours started her own dog walking business. At first she only had a couple customers, and she used Word to create al
GaryK [48]
Hire more people to help type her documents, or make Batch invoices
4 0
3 years ago
Which of the following correctly describes the reason for quality customer service?
Vera_Pavlovna [14]
The correct answer is C. Keep existing customers and clients
Explanation:
Customer service refers to the interaction with customers and support employees in a company provide to customer to guarantee he or she has the best experience when buying one product or service. A high-quality customer service implies providing complete information to customers, and helping them before, during, and even after their process in buying or looking for information in a company. The main purpose of this is that customers feel the support from employees, and are loyal to the company which means they will go back if they need the same service or products. Thus, the reason for quality customer service is "Keep existing customers and clients".
7 0
2 years ago
Other questions:
  • The Microsoft-NanoServer-Guest-Package installs the drivers necessary for installing Nano Server as a host OS on a physical mach
    15·1 answer
  • What type of topology gives you a direct connection between two routers so that there is one communication path?
    14·1 answer
  • "what are the problems with tcp over wireless network?"
    15·1 answer
  • Which of the following can you use to add a picture to your presentation?
    14·1 answer
  • What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
    14·2 answers
  • What is a programming language?
    11·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • Are you absent minded because you are thinking of an online activity?​
    12·1 answer
  • Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program shou
    11·1 answer
  • Does anyone have any tips on how to begin a 10 page Capstone project paper? I've got to write a write a research paper on the ty
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!