1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnZ [28]
2 years ago
7

In ________, an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instr

uctions to it without having to enter the home, office, or organization that owns the network.
Computers and Technology
1 answer:
xxMikexx [17]2 years ago
5 0
The answer is:  "drive-by hacking" .
____________________________________________
 
      "In<span> <u> drive-by hacking </u></span>, <span>an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________</span>
You might be interested in
Which of these is not used by analysts when adopting CASE tools? (1 point) (Points : 1.5) communicating more effectively with us
mojhsa [17]

Answer: expediting the local area network

Explanation: Case tools are the tools or service that helps in the software development but the automatic activity. This tool can be applied on various applications like mobile apps, E-commerce websites etc.

Analyst focus on the features like improving productivity ,low time consumption,integration of the work and making the communication better with the users ,helps in producing large amount of the documents etc.

The only factor not accepted by analyst is accomplishing the operation in the LAN(local area network) as it does not facilitates this operation because it is not software development process.

4 0
3 years ago
Some of the drawbacks to the effectiveness of NSM include all of the following, except which one?
Sunny_sXe [5.5K]

Answer:

The answer is B: Differences in operating systems between the NSM server and other servers

Explanation:

All the evils on your network can be conquered effectively with the proper use NSM. NSM data equips CIRTs to detect and respond to cyber- attacks. With NSM, security analysts are able to discover intrusions early on in the process. Having highlighted all these positives, NSM encounters difficulties when faced with all of the above options apart from B.

5 0
3 years ago
What law formalizes many licensing arrangements used by the software industry and attempts to standardize their use from state t
andrew11 [14]

Answer: (C) Uniform Computer Information

Explanation:

  The uniform computer information is one of the type of transactional act is basically designed the various types of electronic commerce in the united states and by using this act it helps in recognizing the electronic contract by mention all the requirements.

  • The uniform computer information formalizing the various types of licensing arrangement and also standardize their specific use.  
  • In the united state, this model law specify their guidelines from state to another State.    

 According to the given question, the uniform computer information transaction act is used by the software organizations and developed for the purpose of regulate the computer data transactions products like the online based database management and software.    

8 0
3 years ago
What tool checks the spelling of each word against the programs internal dictonary?
Darina [25.2K]
Answer: Spell checker tool
5 0
3 years ago
Ryan is working on the layout of her web page. She needs to figure out where her header, navigation bar, text, and images should
galben [10]
4) Wireframing (89% sure)
6 0
3 years ago
Read 2 more answers
Other questions:
  • The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.â
    14·1 answer
  • What is the main storage device where the computer stores data?
    15·1 answer
  • Hot five was the famous band of which musician?
    14·1 answer
  • Changes in the ownership of a file do not change the amount of data that is considered to belong to a user.
    12·1 answer
  • If there is a slow internet connection or limited access to certain sites it is often better to _________ a video file before st
    9·2 answers
  • Which of the following should you consider when
    5·1 answer
  • What is the name given a technological program that typically copies itself and moves through a computer system in order to disr
    10·1 answer
  • 2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
    14·1 answer
  • Select the correct answer from each drop-down menu.
    7·1 answer
  • How does the technology work
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!