1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BaLLatris [955]
3 years ago
12

An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i

frame that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of a ___________ attack.
Computers and Technology
1 answer:
Stolb23 [73]3 years ago
5 0

Answer:

Water holing is the correct answer to this question.

Explanation:

Waterholing:-

It is a kind of attack in which the attacker detects the sites that the targets of the group frequently access and then afflicts the sites with the ransomware. Which afflicts selected representatives of the target group.

The watering hole assault is a data breach wherein the individual attempts to infiltrate a particular demographic of end-users by harming sites reported to be visited by team members. The aim is to compromise a specific target data and gain network access at the perpetrator's place of work.

You might be interested in
Jack wants to save his PowerPoint file electronically. He should store his file in:
Vikentia [17]

Answer:

C. USB

Explanation:

A USB Disk allows for a Backup of the PowerPoint file in case Jack needs it in the future.

3 0
3 years ago
Read 2 more answers
A telecom company wants to extend their horizontal cables over a distance of 510 meters. Which cable should they use?
Volgvan
They should use fiber cable because it is faster and more reliable
8 0
3 years ago
Match the tool to its description.
topjm [15]

Answer:

Reveal formating- A

Clear formatting-B

Apply formatting of the surrounding text-D

Format painter-C

Explanation:

7 0
3 years ago
Read 2 more answers
Write at leaat 20 shortcuts on the Microsoft word.​
Flauer [41]

Answer:

Open a document: Ctrl + O.

Create a new document: Ctrl + N.

Save the current document: Ctrl + S.

Open the Save As window: F12.

Close the current document: Ctrl + W.

Split the window: Alt + Ctrl + S.

Copy: Ctrl+C

Paste: Ctrl+V

Cut the current selection: Ctrl + X

Copy the current selection: Ctrl + C

Paste the contents of the clipboard: Ctrl + V

Bold: Ctrl + B

Italics: Ctrl + I

Underline: Ctrl + U

Underline words only: Ctrl + Shift + W

Center: Ctrl + E

Make the font smaller: Ctrl + [

Make the font bigger: Ctrl + ]

Change text to uppercase: Ctrl + Shift + A

Change text to lowercase: Ctrl + Shift K

Insert a page break: Ctrl + Enter

Add a hyperlink: Ctrl + K

Explanation:

3 0
2 years ago
If you are in the Slide Master view, what are the steps to add headers and footers?
Marta_Voda [28]

Answer:

THat is the correct order.

Explanation:

6 0
2 years ago
Other questions:
  • Which of these can be considered data?<br> A:facts<br> B:information<br> C:belief<br> D:all of these
    9·1 answer
  • Which of the following is a reason why the comments tool within PDF documents could be helpful? (Select all that apply.)
    5·1 answer
  • In this exercise, you are given a phrase and need to return that phrase in all capital letters.
    6·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • The material of this section assumes that search keys are unique. However, only small modifications are needed to allow the tech
    7·1 answer
  • Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alpha
    7·1 answer
  • When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
    6·2 answers
  • What is the best way to protect against the loss of important files
    15·1 answer
  • How to learning algothrim bett
    5·1 answer
  • What is an example of an assumption and dependency that an automated stocking application project would include in an SRS?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!