1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SOVA2 [1]
3 years ago
13

A security administrator has replaced the firewall and notices a number of dropped connections. After looking at the data the se

curity administrator sees the following information that was flagged as a possible issue:_________.
Computers and Technology
1 answer:
Nata [24]3 years ago
5 0

Answer:

The correct answer is Option(A) i.e., An SQL injection attack is being

attempted.

Explanation:

In this given question some information is missing and is not the complete question. The missing is given as :

SELECT * FROM and ‘1’ = ‘1’

Which of the following can the security administrator determine from this?

A. The SQL injection attacked is being attempted.

B. An Legitimated connections is being dropped.

C. The network scan are being done by the system.

D. An attack of XSS is being attempted.

Now, coming to the answer "The security administration sees that an SQL injection is attempted while it notices a lot of connection dropped and has replaced with the firewall and will be the possible issue flagged on it, SQL injection is a type of injection that possibly executes harmful or malicious statements and effects any website or web application".

Hence the correct answer is Option A.

You might be interested in
A(n) ________ is a server-based operating system oriented to computer networking and may include directory services, network man
Ganezh [65]

Answer:

Network Operating System (NOS)

Explanation:

A network operating system (NOS) is an operating system that makes different computer devices connect to a common network in order to communicate and share resources with each other using a server. A network operating system can be used by printers, computers, file sever among others, and they are connected together using a local area network. This local area network which they are connected to works as the server.

The NOS also acts as a network security because it could be used as an access control or even user authentication.

There are two types of NOS

1) Peer to peer network operating system.

2) Client/server network operating system

A network operating system (NOS) is a server-based operating system oriented to computer networking and may include directory services, network management, network monitoring, network policies, user group management, network security, and other network-related functions.

4 0
4 years ago
9. The monumental failure of Atari's E.T Extra-terrestrial was, among other things, due to the fact that ______________
nlexa [21]

Answer:

c

Explanation:

5 0
3 years ago
Your organization wants to implement a 5-year rotation plan for all of its computing devices. What percentage of the computer fl
sashaice [31]

Answer:

20

Explanation:

C the answer is 20

7 0
3 years ago
Read 2 more answers
Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111
melomori [17]

The given decimal values are converted to octal and hexadecimal.

Explanation:

a. The converted octal value of 111010110001.0112 decimal number is  1473055755061.00557000643334272616

The converted hexadecimal value of 111010110001.0112 decimal number is  19D8B7DA31.02DE00D1B71758E21965

b. The converted octal value of 10110011101.112 decimal number is  113246503335.07126010142233513615

The converted hexadecimal value of  10110011101.112 decimal number is  

25A9A86DD.1CAC083126E978D4FDF4

a. while converting back from octal to decimal the value is 111010110001.01119999999999999989

b. while converting back from octal to decimal the value is

10110011101.11199999999999999973

Hence both the values changes while we convert from octal to decimal.

3 0
3 years ago
Drag each tile to the correct box. Arrange the statements in sequence to correctly explain what the field of science includes. a
erastova [34]

These refer to the elementary steps of the scientific method.

The correct order is as follows:

  • Keen observation of natural phenomena.

  • The use of imagination and creativity to test understanding and predictions.

  • An attempt to verify the understanding of observed natural occurrences establishing verifiable scientific knowledge

  • Continued observance and testing to revise scientific knowledge.

  • An understanding of how or why these natural phenomena occur.

Learn more about the scientific methods at the link below:

brainly.com/question/497944

3 0
3 years ago
Other questions:
  • Ashton Auto Place is a car dealer for new as well as used cars of all makes. It uses computerized Transaction Processing System
    7·1 answer
  • You copy several files from one folder to another folder within the same drive. what permissions do the files in the destination
    14·1 answer
  • Which is the largest unit of measurement for computer data?
    14·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • How can we compare a computer with human beings?
    14·1 answer
  • Which of the following is an example of intellectual property?
    6·2 answers
  • Write the definition of a class Counter containing:
    5·1 answer
  • Write any three type of looping structure with syntax​
    13·1 answer
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!