1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
11

A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser

vers is called dns ____________________.
Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0
Hi,


Answer => Poisoning


Good Lessons
You might be interested in
The user can close all the programs if he closes the open virtual desktop true false
steposvetlana [31]

The user cannot close all the programs if he closes the open virtual desktop.

<h3>What are virtual desktops?</h3>

A virtual desktop is a computer operating system that does not run directly on the endpoint hardware from which a user accesses it.  The desktop environment is separated from the physical device used to access it.

I call it a false desktop.

It is use to separate your work activities.

Therefore, the user cannot close all the programs if he closes the open virtual desktop.

learn more on virtual desktop here: brainly.com/question/14332029

#SPJ12

3 0
2 years ago
If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
Reptile [31]

Answer:

Key escrow.

Explanation:

If a full disk encryption (FDE) password is forgotten, a key escrow can be incorporated to securely store the encryption key to unlock the disk.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

<em>Therefore, when a full disk encryption (FDE) password is forgotten, a key escrow if incorporated can be used to retrieve the password. Subsequently, the password would then be used to unlock or decrypt the disk.</em>

3 0
3 years ago
PLS HURRY <br> Look at the image below
fenix001 [56]

Answer:

one sec

what is that called?

if you have more than one try

then you should just take an "EDUCATIONAL GUESS"

it's a 50/50 chance

just take it

Explanation:

<h2><u><em>YOU GOT THIS MAN! :3</em></u></h2>

8 0
3 years ago
What imaging test can tell the speed and direction of blood
Sindrei [870]
A doppler ultrasound
8 0
3 years ago
Plz help me i need it asap
Ulleksa [173]

Voyager

Shortly after the Pioneers made their flybys, the Voyager1 and Voyager 2 probes followed. They made many important discoveries aboutJupiter and Saturn, including rings around Jupiter and the presence ofvolcanism on Jupiter's moon, Io. Voyager went on to make the first flybys ofUranus, where it discovered 10 new moons, and Neptune, where it found thatNeptune actually weighs less than astronomers thought. Both Voyager crafts have enough power to keep transmitting radio signals until at least 2025, and are now exploring the very edge of the solar system and beginning of interstellar space. Voyager 2 is currently the farthest man-made object from Earth, at more than a hundred times the distance from the Earth to the sun, and more than twice as far as Pluto.

I hope this helps chu

4 0
3 years ago
Other questions:
  • Write a complete program to read two integers and display the number of integers that lie between them, including the integers t
    12·1 answer
  • What does "FDDI" stand for in Technology?
    5·2 answers
  • Assume that name and age have been declared suitably for storing names (like "Abdullah", "Alexandra" and "Zoe") and ages respect
    8·1 answer
  • 18. Applying what formatting option to your Excel workbook will make it easier to read when printed out?
    9·1 answer
  • Is a plotter input output or both
    10·1 answer
  • Two boxes overlap if their interiors have at least one point in common. Give an O(n log n)-time algorithm that decides if there
    8·1 answer
  • How to understand amortized analysis potential?
    12·1 answer
  • Create One print command in LOGO​
    12·1 answer
  • Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should h
    12·2 answers
  • Disadvantages of a grain crusher
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!