1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
9

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo

rly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation? A. Session hijacking; network intrusion detection sensorsB. Cross-site scripting; increased encryption key sizesC. Man-in-the-middle; well-controlled storage of private keysD. Rootkit; controlled storage of public keys
Computers and Technology
1 answer:
Paraphin [41]3 years ago
5 0

Answer:

C. Man-in-the-middle; well-controlled storage of private keys.

Explanation:

During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive, thus describing a well-controlled storage of private keys.

The attacker using those keys to intercept and decrypt sensitive traffic on a web server is a Man-in-the-middle attack.

You might be interested in
8. What do you believe: should husbands make decisions for their wives.
nirvana33 [79]

Answer:

No.

Explanation:

Because wives should make decisions for their life themselves.It helps them be self dependent so that they won't have to depend on their husbands. By letting them make decisions themselves they can get a successful career on their own effort and decisions.

3 0
3 years ago
Which game title went on to become the highest selling unbundled cartridge game?
alexandr402 [8]

Answer:

Tetris

Explanation:

On June 6, 1984, the first version of Tetris was unveiled and quickly took the world by storm. While Tetris has appeared on every major gaming platform from the Commodore 64 to the iPhone, it arguably gained its greatest notoriety as the cartridge game bundled with the original Nintendo Game Boy.

5 0
3 years ago
What type of software resides on a computer’s hard drive, and controls the CPU and all other activity between components?
myrzilka [38]
Operating System  (OS) is the answer.

An application runs in/on an OS.  It is not the OS itself. Like Word or Chrome are applications. 

Systems is too generic and not specific enough to mean anything in this context.  Throw away answer.

Network Operating System does not 'usually' run on a hard drive but on memory chips in things like routers, wireless access points and switches that move network traffic.


3 0
3 years ago
Write a program that print "Censored" if userInput contains the word "darn", else print userInput. End with newline.
Ainat [17]

Answer:

userInput = input("Please enter a string of words ")

userInput.split ()

for item in userInput.split ():

   if item =="darn":

       print("Censored")

       break

else:

   print(userInput)

Explanation:

Using Python programming language, the input function is used to receive the users input and save in a variable userInput

Then the .split method is used to convert the words into a list of words.

Using a for loop, the code checks for the word darn and prints censored if it exists else it prints the userInput

7 0
3 years ago
The design strategy that starts with a global view of the entire problem and breaks the problem down into smaller, more manageab
In-s [12.5K]

Answer:

Top down design

Explanation:

Top-down design is an approach that is used to break down the problem into the smaller subpart so that it can be manageable into more clear form.

C programming is the example of a top-down approach while C++ is the example of the bottom-up approach.

The advantages of the top-down design approach are:

1) easy to manage

2) easy to find the error

3) easy to debug

4 0
3 years ago
Other questions:
  • Approximately what percent of desktop PCs are used for work-related purposes?
    13·2 answers
  • Predict how digital video will be viewed in the future. Step into the year 2028. How are people viewing digital video? Or have w
    13·2 answers
  • If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is b
    8·1 answer
  • Caleb is a big fan of science fiction, so he loves picturing the ________ gland as the captain of his personal starship, pulling
    9·1 answer
  • hãy lựa chọn một doanh nghiệp kinh doanh theo loại hình siêu thị việt nam em hãy tìm hiểu doanh nghiệp và thực hiện theo yêu cầu
    10·1 answer
  • Subcribe to me for brainly my YT is KeepUsweatin
    9·1 answer
  • Explain the steps in starting the MS Access from the Start Menu.​
    9·1 answer
  • Amogus :0) owo have a good day y'all
    12·1 answer
  • Decrypt this secret message if your able to a lot will come..
    14·2 answers
  • What command utilizes the limpel-ziv (lz77) compression algorithm and achieves a compression ratio of 60-70 percent?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!