1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
S_A_V [24]
3 years ago
11

When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate web

site, network, ftp site, or person in a chat session, what type of attack is occurring?
Computers and Technology
1 answer:
timofeeve [1]3 years ago
8 0
A spoofing attack. "<span>a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."</span>
You might be interested in
List the steps to look it install and then run a program or mobile app
Luda [366]

Answer:

1. Open a cloud installer (the source), which is usually Play Store, Aptoide, or UpToDown, in the case of Android phones.

2. Request the package from the server, which will be transmitted via an internet connection. Usually called "downloading".

3. Allow the package provider (mobile store) to install the app on the system, this being the "install" part, where it's put together.

4. Run the app by, usually, pressing the icon in the app drawer.

3 0
3 years ago
What is the name of the hardware device that is used to write the data from hard disk to CD​
mart [117]

it is called a disk drive

4 0
3 years ago
Read 2 more answers
Which of the following CANNOT be done in Normal view A. Enter bolded text in the Notes Pane B. Delete previously entered notes i
blondinia [14]

Answer:

<em>Well, Your answer will be is </em><em>B. Delete previously entered notes in the Notes Pane. Good Luck!</em>

3 0
4 years ago
Happy Valentine's day!!
Lorico [155]
Happy valentine’s u too !!
7 0
2 years ago
Information dashboards enable ________ operations that allow the users to view underlying data sources and obtain more detail.
Alja [10]

I believe what you meant is Performance Dashboard and the correct answer is drill-down/drill-through

Prοvidе visual displays οf impοrtant infοrmatiοn that is cοnsοlidatеd and arrangеd οn a singlе scrееn sο infο can bе digеstеd at a singlе glancе.

4 0
3 years ago
Other questions:
  • The class Date has a single constructor that accepts the integer value: a month- (1 for January through 12 for December), a day
    13·1 answer
  • A network ____ usually contains a computer, networked peripheral, or network device.
    14·1 answer
  • Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
    12·1 answer
  • What is the best use of a line chart?
    7·1 answer
  • A Network Attached Storage device is good for _____.
    11·2 answers
  • The objectivity of a site relates to its a. Appearance c. Graphics b. Biases d. Quotes from other Internet authors
    8·2 answers
  • I'm 11, except my profile says I'm 15.
    15·1 answer
  • The duties of a database administrator include determining which people have access to what kinds of data in the database; these
    13·2 answers
  • Which can be used to create a poll on a web page? <br>CSS<br>HTML <br>JavaScript <br>Text editor​
    12·1 answer
  • Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a d
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!