1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
8

Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network

so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice.
Required:
List some of the malicious things Trudy can do from this position.
Computers and Technology
1 answer:
Svetllana [295]3 years ago
8 0

Answer:

Trudy can

1. corrupt the packet sent over the network

2. fail to deliver packet to the receiver

3. compromise private data

4. can drop packets

5. modify the packet

Explanation:

the question tells us about the transfer of packets between two people or clients. but there is now a third person Trudy because the network has been compromised. so Trudy can capture the packets and use them maliciously from her position by:

corrupting the data packets of either Bob or alice or both and this would end up causing discrepancies between what was sent and what was intended by the sender

trudy would have seen all the contents of this packet and still pretend like she knows nothing about it. Data loss can occur because trudy might receive packet and maliciously fail to deliver it to the intended receiver leading to a compromise and loss of data.

trudy can compromise private data by pretending, listening and observing from her position while acting as either Bob or alice and she can modify data, misuse data or even drop it.

You might be interested in
How do transformers work?
Umnica [9.8K]
A transformer will either step up or down to the necassary voltage using a core wrapped in a coil of wires.
8 0
3 years ago
Read 2 more answers
When selecting font size in a document, ____ points equals one-inch-tall text?
IgorC [24]
Hello <span>Jhigg4685 
</span><span>

Answer: When selecting font size in a document, 72 points equals one-inch-tall text?


I hope this helps
-Chris</span>
3 0
4 years ago
When are numbered lists generally used
tatuchka [14]

C. When listing items that have an order of priority.

Explanation:

There are a lot of ways to list items such as alphabets and Roman numerals.

And the all have their respective reasons.

When numbering in order of priority, it is more appropriate to use numbers instead of alphabets and Roman numerals.

8 0
3 years ago
sales reps at universal containers use salesforce on their mobile devices. They want a way to add new contacts quickly and then
Mamont248 [21]

Answer:

Build a global action to create Contacts

Explanation:

Based on the information given the mobile solution that an app builder should recommend should be GLOBAL ACTION because global action enables new contact to be created quickly ,Global actions also enables the creation or update of records as well sending email, all without leaving the page the person is working on which is why GLOBAL ACTION is often recommended because it saves time.

6 0
4 years ago
In what way, if any, is a model different from a simulation?
madam [21]

Answer:

Models and Simulations are completely different in that they achieve diffenet results.

Explanation:

Modeling is the act of building a model. A simulation is the process of using a model to study the behavior and performance of an actual or theoretical system. In a simulation, models can be used to study existing or proposed characteristics of a system. ... Simulating is the act of using a model for a simulation.

6 0
3 years ago
Other questions:
  • What does usb stand for
    8·2 answers
  • arlos, an algebra teacher, is creating a series of PowerPoint presentations to use during class lectures. After writing, formatt
    12·2 answers
  • A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially fill
    12·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    6·1 answer
  • 12. How many different documents can<br> you have open at one time?
    8·1 answer
  • Which of the following is an example of metadata about a webpage?
    7·2 answers
  • windows 93 it is a website THE QUESTION IS WHAT IS THE FIRST THING THAT POPS UP WHEN YOU OPEN THE WEBSITE?
    8·1 answer
  • Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
    5·1 answer
  • What can be changed when a style is modified?
    5·2 answers
  • 4. In computers, an integer can be represented by more than 8-bit, what is the largest positive integer that
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!