1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
3 years ago
15

A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were se

t to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?A . PhishingB . Social engineeringC . Man-in-the-middleD . Shoulder surfing
Computers and Technology
1 answer:
Alex17521 [72]3 years ago
6 0

Answer:

C . Man-in-the-middle

Explanation:

The man-in-the-middle technique is about the interference of a third party in the communication channel, without any of the extremes being able to notice its existence, in this way, for the user as well as for the destination page the communication will seem normal.

In this case, by redirecting traffic to a PROXY server, the attacker will have the possibility to read all the information that passes through it, being able to obtain all the desired data.

Other Malware can be used to configure the connection of the computer through the PROXY of the attacker and in this way the channel is open, until the PROXY is disabled and the malware that redirects is blocked or uninstalled.

You might be interested in
Write the definition of a class Telephone. The class has no constructors, one instance variable of type String called number, an
balu736 [363]

Answer:

The definition of a class Telephone is given as  

public class Telephone // class telephone

{

String number; // variable  number of type string

static int quantity = 250; // variable  quantity  of type int

static double total = 1565.92;  // variable  total  of type double

}

Explanation:

Following is the description of Statement

  • Create a class "Telephone" by using the keyword class.In that class we declared data member .
  • We declared a variable "number" of type "string" which has no constructor.
  • We declared a variable  "quantity" of type "int" which is a static type variable. The static type variable retains the value during the program execution.
  • We declared a variable  "total" of type "double" which is a static type variable. The static type variable retain the value during the program execution .
5 0
4 years ago
PLz answer I really need the answer
zlopas [31]

Answer:

a

Explanation:

job leads

4 0
3 years ago
Read 2 more answers
unittttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt
alukav5142 [94]
What the hell is the point of this, just to waist people's time?
5 0
3 years ago
2. A computer is using a fully associative cache and has 216 bytes of memory and a cache of 64 blocks, where each block contains
Irina-Kira [14]

Answer:

2048 blocks

Explanation:

From the information given:

The memory size of a computer with fully associative cache = 2¹⁶ bytes

The no. of blocks in a single cache = 64

In which each block size = 32 bytes

The no of blocks in the main memory = memory size ÷ block size

The no of blocks in the main memory = 2¹⁶ ÷ 32

The no of blocks in the main memory = 2¹⁶ ÷  2⁵

The no of blocks in the main memory = 2^{16-5}

The no of blocks in the main memory = 2¹¹

The no of blocks in the main memory = 2048 blocks

4 0
3 years ago
Use the following to calculate the acid-test ratio. (Round your answer to two decimal places.) Cash: $100,000 Short-term investm
uysha [10]

Answer: 0.48

Explanation:

The acid test ratio will be calculated as:

Cash = $100,000

Add: Short term investments = $17,000

Add: Net Current Receivables = $250,000

Total Assets = $367,000

/ Total Current Liabilities = $760,000

Acid Test Ratio will now be:

= Total Assets / Total Liabilities

= $367000/$760000.

= 0.48

Therefore, the acid test ratio is 0.48.

5 0
3 years ago
Other questions:
  • As of 2012, Twitter has approximately how many members?
    10·1 answer
  • What is instant messaging
    5·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • An investment website can tell what devices are used to access the site. The site managers wonder whether they should enhance th
    10·1 answer
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​
    13·1 answer
  • The best presentations try to include as much text as possible on each slide true or false ​
    13·1 answer
  • To input lenth in meter and convert in to centimeter​
    6·1 answer
  • Hello can someone help with the output of this please?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!