1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
12

In DNS cache poisoning, valid packets exploit poorly configured DNS servers to inject false information to corrupt the servers'

answers to routine DNS queries from other systems on the network. True or false?
Computers and Technology
1 answer:
myrzilka [38]3 years ago
4 0

Answer: True

Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.

It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.

You might be interested in
A(n) ________ variable is declared inside a module and cannot be accessed by statements that are outside the module.
Advocard [28]
Local






----------------------------------------------------
6 0
3 years ago
________ is a markup language that allows for tagging selected elements of the content of documents for their meanings and is us
trasher [3.6K]

Answer:

E)nXML

Explanation:

XML is a short for Extensible Markup Language. It is a markup language like the Hypertext markup language (HTML) and are both used in the development of web applications. However while the HTML describes the content of the Web page that is the graphics, images and videos and how they are displayed, the XML handles the description of data and information formats, their storage and the transportation and sharing over the internet.

4 0
3 years ago
Read 2 more answers
if you see that your bank account has had some money taken out that you did not authorize, which of the following is one action
Savatey [412]
I would go straight to the bank and have it reported along with the police.
7 0
3 years ago
This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Polic
erastovalidia [21]

This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Policy is known to be an error message.

<h3>What is the error message about?</h3>

The Error message above is known to be one that shows that  your IT department has made a group policy in one's company's Active Directory. It is known to be one that tends to disables the use of ADRMS (Rights Management Feature) in all to all users.

Note that in the case above, one need to ask your IT department to be able to disable or make changes to the group policy so that it will not apply to the users who are said to require access secured Microsoft Office documents in any of Ansarada Rooms.

Another option is to look at documents off the network with the use of a personal computer or a mobile phone.

Hence, This rights protected document cannot be opened because the rights management feature has been disabled on your machine by Policy is known to be an error message.

Learn more about  error message from

brainly.com/question/25671653

#SPJ1

4 0
2 years ago
What are the steps involved in accepting all the changes in a document?
I am Lyosha [343]
  1. you can accept or reject the changes one at a time or all at one time.
  2. click at the beginning of the document , and then on the review tab, click next to go to the first tracked change.
  3. Click Accept or reject to keep or remove the change.

Keep repeating the step 2 until you've reviewed all of the changes in your document.

*Hope this helps !!! Mark me Brainliest :)

7 0
3 years ago
Read 2 more answers
Other questions:
  • Marie uses a browser to visit a blog. What is the unique identifier of the blog?
    13·2 answers
  • If you wanted to create a graph that showed how much each value contributed to the whole value, you would use a _____.
    15·2 answers
  • For window 7 explain the steps you will use to find the available program you will list.
    13·1 answer
  • what is musical technology specifically, the origins of its genesis &amp; its importance to the baroque era
    6·1 answer
  • What is a characteristic of tasks in Outlook?
    10·2 answers
  • EASY POINTS what favorate food<br> so easy
    7·2 answers
  • You are splitting up all your apples equally between 3 people. which statement below will calculate how many apples will be left
    12·1 answer
  • Typically, a DVD has how many times more capacity than a CD?
    12·1 answer
  • What are the steps in preparing a bootable USB installer?​
    11·1 answer
  • What does this mean? And how did I get it?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!