1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
9

In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins

erts them back into the network.
Computers and Technology
1 answer:
Oduvanchick [21]3 years ago
3 0

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

You might be interested in
Which programming language is fortnite created in?
Ahat [919]

Answer:

Fortnite has been made by Epic Games with their own engine What is Unreal Engine 4 that is freely available to everyone. The cool thing about it is that it doesn't require a programming language to make games. Unreal Engine itself is made in C++, but developers mostly use its main feature, blueprints.

Muahahhahahhaha....................

3 0
3 years ago
Read 2 more answers
Select the correct answer.
tangare [24]

Answer:

A. noise reduction

Explanation:

noise reduction reduces the loud sounds and makes it low, also noted that the low sounds are kept the same meaning its definitely noise reduction.

Extra's:

  • amplify - increases the strength of a sound.
  • compress - makes and affects both low and high sound by making them averagely high
  • normalise - to get the maximum volume.
3 0
2 years ago
Which is a tool that allows you to copy formatting from one place and apply it to other places?
ruslelena [56]

Answer:

copy and paste

Explanation:

highlight, right click, then go to where you want it, then right click again, and paste. and done

8 0
4 years ago
Write a programe to add two numbers using function with return type"void".
Grace [21]

Answer:

#include<iostream>

using namespace std;

//create the function which add two number

void addTwoNumber(int num_1,int num_2)

{

   int result = num_1 + num_2;  //adding

   

   cout<<"The output is:"<<result<<endl;  //display on the screen

}

//main function

int main(){

   //calling the function

   addTwoNumber(3,6);

   return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

then, create the function which adds two numbers. Its return type is void, it means the function return nothing and the function takes two integer parameters.

then, use the addition operation '+' in the programming to add the numbers and store the result in the variable and display the result.

create the main function for testing the function.

call the function with two arguments 3 and 6.

then, the program copies the argument value into the define function parameters and then the program start executing the function.

6 0
4 years ago
If a user has one column in a table and would like to make it into two columns, which command should be used?
Vesna [10]
Split cells.

This answer needs to be twenty characters long to qualify so here is this useless sentence.
4 0
4 years ago
Other questions:
  • Keyshia adds shapes with text to show the steps involved in taking the temperature of a liquid in a laboratory. She
    6·1 answer
  • You should not define a class field that is dependent upon the values of other class fields: Group of answer choices In order to
    14·1 answer
  • in a management information system, the quality of information is determined by its usefulness to users, and its usefulness dete
    8·1 answer
  • How do i cancle my account on brainly
    11·1 answer
  • What will happen if you delete system32?
    7·1 answer
  • Match the following.
    8·1 answer
  • 6. A genre of video game in which a player chooses a character and builds, upskills and modifies that character is referred to a
    12·2 answers
  • Philp has taken selfie wearing T-shirt that read "California 92." However, the text is mirrored in the selfie. He wants to uploa
    9·1 answer
  • 3. When code tracing, why is it important to iteratively test parts of the program?
    8·1 answer
  • A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!