1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveticcg [70]
4 years ago
9

Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,

and rather than entering proper login credentials, the attacker entered some odd text: ‘ or ‘1’=’1. What is this attack known as?
Computers and Technology
1 answer:
Afina-wow [57]4 years ago
7 0

Answer:

The attack is known as SQI Injection attack.

Explanation:

SQI injection usually exploit some security lapse in an application software for it to be able to work. It usually attack websites and mostly known as attack vector but may equally attack any type of SQL database of a company. These attacks allow attackers to steal and use identity, tamper with existing data on a system or website of the company or allow the complete disclosure of all data on the system. SQL Injection can also destroy the data or make it otherwise unavailable. Most importantly, it can become administrators of the database server or even cause reconciliation issues for such company transactions (e.g banks) such as voiding transactions or changing balances.

You might be interested in
Pls help will mark brainliest as soon as u awnser
NNADVOKAT [17]

Answer:

The answer is...

Explanation:

It is A or D I would go with D tho

Hope this helped

:)

5 0
3 years ago
Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
liraira [26]
I have no clue what you are talking about I am so sorry
5 0
3 years ago
What component of a change management program includes final testing that the software functions properly
ValentinkaMS [17]

A component of a change management program which includes final testing that the software functions properly is: C) Release management.

<h3>What is SDLC?</h3>

SDLC is an acronym for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs (applications).

In Computer science, there are seven (7) phases involved in the development of a software program and these include the following;

  • Planning
  • Analysis
  • Design
  • Development (coding)
  • Testing
  • Deployment
  • Maintenance

At the final testing stage, a component of a change management program which ensure that the software functions properly is known as release management.

Read more on software here: brainly.com/question/26324021

#SPJ1

Complete Question:

What component of a change management program includes final testing that the software functions properly?

A) Request management

B) Change management

C) Release management

D) Iteration management

5 0
2 years ago
1.where should the name of the website or company logo appear on a website
Paul [167]

Answer:

1. First Page

2. Two Colors

8 0
3 years ago
Read 2 more answers
Write only in C, not C++.
yawa3891 [41]

Answer:

#include <iostream>

using namespace std;

int main() {

  int k;

double d;

string s;

cin >> k >> d >> s;

cout << s << " " << d << " " << k << "\n" << k << " " << d << " " << s; }

                                                                   

Explanation:

k is int type variable that stores integer values.

d is double type variable that stores real number.

s is string type variable that stores word.

cin statement is used to take input from user. cin takes an integer, a real number and a word from user. The user first enters an integer value, then a real number and then a small word as input.

cout statement is used to display the output on the screen. cout displays the value of k, d and s which entered by user.

First the values of k, d and s are displayed in reverse order. This means the word is displayed first, then the real number and then the integer separated again by EXACTLY one space from each other. " " used to represent a single space.

Then next line \n is used to produce a new line.

So in the next line values of k, d and s are displayed in original order (the integer , the real, and the word), separated again by EXACTLY one space from each other.

The program along with the output is attached.

7 0
4 years ago
Other questions:
  • A ____ is a prewritten formula that is built into excel.
    6·1 answer
  • Karen thinks she should go out with Blane, an unattractive, social misfit, because “If I don’t go out with him, people will thin
    7·1 answer
  • The Telecommunications Act of 1996 was a mixed bag for cable customers. Although cable companies argued that it would bring more
    8·1 answer
  • Consider the following statement from the CS Principles course framework: The global distribution of computing resources raises
    12·1 answer
  • State two function of protein in the body
    8·1 answer
  • What best describes the ability to increase the access to server resources and provide fail-safe services by linking two or more
    13·1 answer
  • What can be used to help diagnose and fix network connection problems?
    8·1 answer
  • Also have a good day people !!
    5·2 answers
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
  • Kenny is asked to submit a photo for the annual photographic competition. He decided to capture a photo with the light-painting
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!