1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
15

A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were se

t to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?A . PhishingB . Social engineeringC . Man-in-the-middleD . Shoulder surfing
Computers and Technology
1 answer:
Alex17521 [72]3 years ago
6 0

Answer:

C . Man-in-the-middle

Explanation:

The man-in-the-middle technique is about the interference of a third party in the communication channel, without any of the extremes being able to notice its existence, in this way, for the user as well as for the destination page the communication will seem normal.

In this case, by redirecting traffic to a PROXY server, the attacker will have the possibility to read all the information that passes through it, being able to obtain all the desired data.

Other Malware can be used to configure the connection of the computer through the PROXY of the attacker and in this way the channel is open, until the PROXY is disabled and the malware that redirects is blocked or uninstalled.

You might be interested in
Pls help I don’t know the answers
kifflom [539]

Answer:

1. DLL Files.

2. System software repair.

3. Software configuration.

4. Human-computer interaction.

5. A graphical user interface (GUI).

Explanation:

1. DLL Files can become lost or damaged on a computer and prevent it from working correctly. These are important registry files used by various system softwares to perform specific tasks.

2. System software repair is a type of software you can run to help fix computer problems. Some examples are disk defragmenter, regedit, etc.

3. Software configuration means the process of setting up an application and selecting specific options. This is usually done in the settings section of a software application or program.

4. Human-computer interaction is the name of the discipline concerned with the design of optimal user interfaces.

5. A graphical user interface (GUI) is what users make use of to interact with graphical icons and other visual elements in order to accomplish tasks.

4 0
3 years ago
Why must an rodc be able to connect to at least one windows server 2008 or higher domain controller?
raketka [301]
<span>Ensure that at </span>least one<span> writable </span>DC<span> must be running </span>Windows Server 2008<span> or higher before you can deploy a Read-Only-Domain-Controller.</span>
6 0
3 years ago
Write a function in python that computes and returns the sum of the digits for any integer that is between 1 and 999, inclusive.
DanielleElmas [232]

Answer:

def sum_digits(number):

   total = 0

   if 1 <= number <= 999:

       while number > 0:

           r = int (number % 10)

           total +=r

           number /= 10

   else:

       return -1

   return total

   

print(sum_digits(658))

Explanation:

Write a function named sum_digits that takes one parameter, number

Check if the number is between 1 and 999. If it is, create a while loop that iterates until number is greater than 0. Get the last digit of the number using mudulo and add it to the total. Then, divide the number by 10 to move to the next digit. This process will continue until the number is equal to 0.

If the number is not in the given range, return -1, indicating invalid range.

Call the function and print the result

3 0
3 years ago
Who is responsible for keeping your facility in compliance? A) Technicians B) Supervisors C) Owners D) All of the above
zhenek [66]

Based on my personal experience in the workforce, all of the above would be the correct answer. That's based off my experience though. Owners would regularly come in and talk to our managers and employees to make sure everything was kept in order and in compliance. The only other answer I could see fit would be supervisors. Hope I was able to help :)

3 0
3 years ago
Which devices are managed through device management?
Ratling [72]
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
7 0
2 years ago
Other questions:
  • You are responsible for performing all routine maintenance on your company's laser printers. Which of the following maintenance
    15·1 answer
  • Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules
    14·1 answer
  • What best describes "broadband access"?
    13·1 answer
  • I need help with yes lol please and thank you
    15·2 answers
  • What are the steps to customize a slide show?
    10·2 answers
  • LAB: Convert to binary - methods
    11·1 answer
  • The
    6·1 answer
  • 100 points for this and brainlyist lol
    11·1 answer
  • How was data put into the Tabulating Machine?
    7·1 answer
  • 7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!