1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
4 years ago
14

An attacker tried to hack into the database of a reputed organization. The attacker inserted malicious code into the query of a

database. What type of attack was the attacker involved in?
A. input attack
B. spoofing
C. querying
D. phishing
E. forgery
Computers and Technology
1 answer:
babunello [35]4 years ago
4 0

a.) input attack is the correct answer

You might be interested in
What motivates high school students to join professional organizations?
Jet001 [13]
Having a good curriculum, learning more about something that you like, helping people. It also depends on what professial organization students wanna join. 
8 0
3 years ago
Read 2 more answers
What kind of bond is created by the attraction between atomic particles of opposite charge?
Veseljchak [2.6K]
That is called an lonic bond.

Ionic bonds are formed between elements with greater than 1.4 electronegative variance and to a lesser extent by first ionization energy variance, such as alkali metals and nonmetal halogens for example. The element of lesser electronegativity, the cation, donates an electron(s) from it's valance shell to the element with the greater electronegativity, the anion, which accepts the electron(s) unto it's valance shell. This bond is extremely strong and has a high melting point but because of waters polar nature this type of bond, usually, not always, disassociates in water.
5 0
3 years ago
Read 2 more answers
Several different tunneling protocols can be used in dial-up situations. Which of the following would best be used as a VPN tunn
melomori [17]

Answer:

The answer is the point - to -point protocol, which allows user to set a secure VPN connection for client and server connectivity.

Explanation:

A virtual private network is a private-public network because of encryption and tunneling to ensure the integrity of the data. VPN requires a tunnel to work and encryption.

In VPNs, there are different protocols can be used, such as point- to - Point Tunneling Protocol (PPTP), IPSec, and L2TP.

Point to Point Protocol is a Microsoft protocol which allows user to set a connection and secure VPN destination. Point to point protocol is designed for client and server connectivity. It developed a connection between two computers. The data link layer that transmits over IP networks is used for point to point tunneling.

Such as option A is not correct because it is distracter and IPSecis primary tunneling protocol. It supports only IP networks. L2TP is not a VPN but extend VPN over the various network.

3 0
4 years ago
Gus wants to select different data for a chart he has made what sequence should he follow
allochka39001 [22]
What do you mean by this?
8 0
4 years ago
What is processing for a computer?​
iogann1982 [59]

Answer:

is an action or series of actions that a microprocessor, also known as a central processing unit (CPU), in a computer performs when it receives information.

5 0
3 years ago
Other questions:
  • Hot five was the famous band of which musician?
    14·1 answer
  • Anna is making a presentation on the top five most visited cities in her state. she wants to make sure that she does not put in
    11·2 answers
  • Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a
    13·1 answer
  • The appropriate software to use for creating research papers is ________ software. Select one: A. presentation B. word processin
    15·1 answer
  • Suppose we are sorting an array of eight integers using quicksort, and we have just finished the first partitioning with the arr
    6·1 answer
  • #include
    11·1 answer
  • What option do you use to view your presentation?
    15·1 answer
  • Conduct research to determine the best network design to ensure security of internal access while retaining public website avail
    9·1 answer
  • Edhesive code practice 6.3
    14·2 answers
  • Effectiveness of thicker,biodegradable plastic shopping bags
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!