1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
9

In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins

erts them back into the network.
Computers and Technology
1 answer:
Oduvanchick [21]3 years ago
3 0

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

You might be interested in
Google analytics is an example of which of the followinga) search engine
mart [117]
Google Analytics works on statistics. It allows businesses/websites to get an insight into what their customer's needs and wants are. 
Out of the answers you've given, I would say it is a site Management Tool. 

Cancelling out: (and reasons for cancelling them) 
Search Engine - Google on its own is a search engine, however, Analytics is a 'Subsidiary' if you will. 
Google Chrome is a Web Browser - Not the sector of Google Analytics. 
Security Services - It does not encrypt anything (or make anything safer for users) 


4 0
3 years ago
How do you get Brainliest on a question?
Mama L [17]

Answer:

yes that is the way things work and I think for the answer to be marked brainiest there must be two answers that were posted.

Explanation:

Hope this helps:)

5 0
3 years ago
Read 2 more answers
Which of the following is the term for software that automatically displays or downloads unwanted offers?
slega [8]
Adware. Adware displays ads and popups. The other options are completely different from each other
5 0
3 years ago
You need to have a password with 5 letters followed by 4 even digits between 0 and 9, inclusive. if the characters and digits ca
aleksandr82 [10.1K]
We all know that there are 26 letters available in the alphabet and there are just 5 even numbers between 0 and 9. We are now given the situation of how many passwords can we make out of the criteria of having 5 letters that cannot be repeated and 4 even digits from 0-9. We cannot repeat the numbers and letters, thus our password will look something like this, LLLLLNNNN, where L is a letter and N is a number. Let us note that  we cannot use the characters and digits more than once.This is how we will solve the probable number of passwords.

26 x 25 x 24 x 23 x 22 x 5 x 4 x 3 x 2

When we compute this formula, we will have the total number of possible passwords:

947,232,000.00

There are 947,232,000 possible passwords based on the given criteria.
8 0
3 years ago
Can someone just help Im really struggling right now<br> Tysm if you help
frutty [35]

That's really really hard, my god Cassie!

Explanation:

I don't know what the answer is. bekos Yu du not is da layer of da peyk Cassie. di ka mukhang dragon

6 0
3 years ago
Other questions:
  • What is a pin? part of a connector a port part of a cable a NIC
    14·1 answer
  • Which objects with developed to help astronomers to learn more about the sun
    12·1 answer
  • Drag the tiles to the correct boxes to complete the pairs.
    6·1 answer
  • What are Boolean​ connectors? A. sites that connect you to more information on your topic B. databases that link your topic to a
    10·1 answer
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • Why is it important to try to make financial decisions without emotions.
    12·2 answers
  • Cookies Are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day
    13·1 answer
  • What are non-examples of wage and salary?
    7·1 answer
  • Evaluate means having a preference for one thing over another in a way that's unfair.
    5·1 answer
  • Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!