1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
beks73 [17]
3 years ago
8

An attacker has been successfully modifying the purchase price of items purchased on the company's web site. The security admini

strators verify the web server and Oracle database have not been compromised directly. They have also verified the Intrusion Detection System (IDS) logs and found no attacks that could have caused this. What is the mostly likely way the attacker has been able to modify the purchase price?
Computers and Technology
1 answer:
Kruka [31]3 years ago
8 0

Answer:

Form the given statement i have come to know that the by changing hidden form values attacker has been able to modify the purchase price.

Explanation:

User can change a hidden field is not different from a common field from browser or server side.

If you want to store data then user must have to store them on server -side on a session and it is a fastest way.

You might be interested in
BRAINLIEST Which function will add a name to a list of baseball players in Python?
Tju [1.3M]

Answer: Append()

Explanation:

8 0
3 years ago
Read 2 more answers
Web client software, such as Chrome, Firefox, Internet Explorer, Safari, and Opera, that are used to view Web pages are known as
evablogger [386]

Answer: Web Browsers

Explanation: The application software that works on the World Wide Web(www) is known as the web browser. Web browsers are the application must be installed on the user's system so that the accessing of the web server can be done.

There are different types of web browsers, out of which the most popular is Chrome and other examples are Internet Explorer, Opera, Firefox etc.

8 0
3 years ago
Read 2 more answers
Characteristics of a deterministic system<br>​
Fiesta28 [93]

Explanation:

deterministic system is a involved in development of future states of the system is called deterministic determinstic system.

3 0
3 years ago
Which of the following is least likely to be a scientific experiment
Dennis_Churaev [7]

Answer:

what causes gravity to have a amount of force on one object but not another

Explanation:

3 0
3 years ago
You have a MySQL database running on an EC2 instance in a private subnet. You can connect via SSH, but you are unable to apply u
AnnZ [28]

Answer:

Ensure that "Source/Destination Checks" is disabled on the NAT instance.

Explanation:

A NAT (Network Address Translation) instance is, like a bastion host, an EC2 instance that lives in your public subnet. A NAT instance, however, allows your private instances outgoing connectivity to the internet while at the same time blocking inbound traffic from the internet.

Many people configure their NAT instances to allow private instances to access the internet for important operating system updates. Patching your OS is an important part of maintaining instance level security.

NAT device enables instances in a private subnet to connect to the Internet or other AWS services, but prevents the Internet from initiating connections with the instances.

NAT devices do not support IPv6 traffic, use an egress-only Internet gateway instead.

5 0
3 years ago
Other questions:
  • The ability to learn a new computer software program is to ____________ as knowledge of state capitals is to _____________.
    11·1 answer
  • The accessibility of a website refers to which of
    6·1 answer
  • Which of the following is considered to be intellectual property?
    9·1 answer
  • Is there a way I can put an already made sound that i created over an already made video
    6·1 answer
  • A business traveler notices there is an extra connector between the keyboard and the computer, in a business center. She has mos
    12·1 answer
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • Coment on this if your user starts with dida
    5·1 answer
  • State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translat
    14·1 answer
  • Can able to Computer decide its input by itself? How ?​
    15·1 answer
  • Which three options below describe typographic hierarchy?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!