1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
5

Defeating authentication follows the method–opportunity–motive paradigm.

Computers and Technology
1 answer:
sashaice [31]3 years ago
3 0

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

You might be interested in
To see a custom, object-specific action on the palette of the page layout editor: A. Click Layout Properties on the page layout
Masja [62]

Answer:

Select Mobile & Lightning Actions in the list of element types

Explanation:

Option B is correct Answer.

8 0
3 years ago
Beth wants to add information to her PowerPoint presentation that is hidden from her audience and only she will
Veseljchak [2.6K]

Answer:

howdy

Explanation:

4 0
4 years ago
What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
makvit [3.9K]

Solution:

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.

DDoS attacks have been carried out by diverse threat actors, ranging from individual criminal hackers to organized crime rings and government agencies. In certain situations, often ones related to poor coding, missing patches or generally unstable systems, even legitimate requests to target systems can result in DDoS-like results.

It works as:

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master system identifies other vulnerable systems and gains control over them by either infecting the systems with malware or through bypassing the authentication controls (i.e., guessing the default password on a widely used system or device).

A computer or networked device under the control of an intruder is known as a zombie, or bot. The attacker creates what is called a command-and-control server to command the network of bots, also called a botnet. The person in control of a botnet is sometimes referred to as the bot master.

Botnets can be comprised of almost any number of bots; botnets with tens or hundreds of thousands of nodes have become increasingly common, and there may not be an upper limit to their size. Once the botnet is assembled, the attacker can use the traffic generated by the compromised devices to flood the target domain and knock it offline.


8 0
3 years ago
There are two String variables, s1 and s2, that have already been declared and initialized. Write some code that exchanges their
Ivan

Answer:

//here is code in java.

import java.util.*;

class Solution

{

// main method of class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // declare an initialize first string variables

     String st1="hello";

     // declare an initialize first string variables

     String st2="world";

     // create another string variable

    String st3;

    // exchange the value of both string variables

    st3=st1;

    st1=st2;

    st2=st3;

    System.out.println("value of first String after exchange: "+st1);

    System.out.println("value of second String after exchange: "+st2);

   }catch(Exception ex){

       return;}

}

}

Explanation:

declare and initialize two string variables.Create another string variable "st3". first assign value of "st1" to "st3" after then value of "st2" to "st1" and then  assign value of "st3" to "st2". This will exchange the values of both the string.

Output:

value of first String after exchange: world

value of second String after exchange: hello

8 0
3 years ago
Read 2 more answers
This program is to read in a list of integers until the value of -999 is input. Complete the program so that it prints out the n
kvv77 [185]

Answer:

#include <stdio.h>

int main()

{

   int val, total = 0, count = 0;

   float average = 0;

   printf ("Enter in a list of numbers followed by the terminal value of -999\n");

   scanf ("%d", &val);

   while (val != -999){

   

       if(val != -999){

           total += val;

           count++;

       }

       

       scanf("%d", &val);

   }

   

   average = (float)total / count;

   

   printf ("For the list of %d numbers with a total of %d\n", count, total);

   

   printf (" the average is: %15.5f\n", average);

   return 0;

}

Explanation:

Declare the total, count and average variables

In the while loop:

Add the entered number to the total and increment the count by 1 unless it is -999

Calculate average, divide total by count (Typecast the total as float to get decimal result)

7 0
4 years ago
Other questions:
  • int replace_text (Document *doc, const char *target, const char *replacement) The function will replace the text target with the
    15·1 answer
  • A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
    10·1 answer
  • Lisa as a grade 6 student, not only knows how to read and write but also, she can solve problems critically proven from quiz bee
    12·1 answer
  • Use ___________ positioning to configure the location of an element to remain the same and to not move even when the web page is
    6·2 answers
  • CPT, which is used to code procedures in an office, is an example of a/an
    12·1 answer
  • Write an application that accepts up to 20 Strings, or fewer if the user enters the terminating value ZZZ. Store each String in
    15·1 answer
  • My mom hid my laptop and now I can't find it​
    9·1 answer
  • Please answer<br><br>NO LINKS​
    7·1 answer
  • What tool should be used to remove fields and format data when importing?
    10·1 answer
  • . In the ____, you justify acquiring newer and better resources to investigate computer forensics cases.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!