1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
4 years ago
14

An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a

database. What type of attack was the attacker involved in?
A. input attack
B. spoofing
C. querying
D. phishing
E. forgery
Computers and Technology
1 answer:
babunello [35]4 years ago
4 0

a.) input attack is the correct answer

You might be interested in
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
How does an ip address allow your computer to be reached
LiRa [457]
Not sure if this helps

The "IP" part of IP address stands for "Internet Protocol." The "address" part refers to a unique number that gets linked to all online activity you do...somewhat like a return address on a letter you'd send out. (All this happens in milliseconds.)
Your computer is hooked up to the Internet, one way or the other. When you go online for email, to shop or chat, your request has to be sent out to the right destination, and the responses and information you want need to come back directly to you.

An IP address plays a significant role in that.

You and your computer actually connect to the Internet indirectly: You first connect to a network that is 1) connected to the Internet itself and 

8 0
3 years ago
Which steps will create a new blank word document
mrs_skeptik [129]

Answer:

Open word

File > New

Select a template

8 0
3 years ago
What if i accidentally delete an assignment in canvas.
elena55 [62]

Answer:

it shouldnt matter. If it was one that was already graded then you should be good. But if it hasnt had a grade and it doesnt ever come back, then check in with your teacher to make sure your still getting the grade.

Explanation:

Hope this helps :)

8 0
2 years ago
The purpose of the ________ protocol is to ensure the integrity of the communication.
Vladimir [108]

The purpose of the transmission control protocol is to ensure the integrity of the communication.

The TCP/IP network architecture also refers to the Internet architecture. The Transmission Control Protocol (TCP) is a transport layer protocol, and the Internet Protocol (IP) is a network layer protocol.

<h3>What is Transmission control protocol ?</h3>

Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is intended to send packets over the internet and make sure that data and messages are successfully delivered through networks.

  • TCP's (Transmission Control Protocol) purpose is to regulate data transport so that it is dependable. Connection management, dependability, flow control, and congestion control are the four fundamental TCP functions. Connection initialization (a three-way handshake) and termination are included in connection management.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

3 0
2 years ago
Other questions:
  • What was a lesson that the Enlightenment taught people?
    11·1 answer
  • Eric is working on a computer that has a device driver error. Eric can find the name of the device driver however the actual dev
    8·1 answer
  • Which are SD card types? Choose two answers.<br> Macro-SD<br> Max-SD<br> MicroSD<br> MiniSD
    5·2 answers
  • A={a,b,c,d} B={p,q,r,s} find the value of A-B and B-A​
    13·1 answer
  • Click/press _______ to remove the most recently typed text.
    12·2 answers
  • How many bit make a byte .​
    12·2 answers
  • Edhesive assignment 7 calendar
    10·1 answer
  • How do even do anything on Rblx Creator?? Will give branliest for whoever gives me the most info.
    13·1 answer
  • What are the advantages of mine shaft gear and the disadvantaged​
    9·1 answer
  • How did the invention of the printing press affect society?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!