1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
13

In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____

__ help send a forged HTTP request.
Computers and Technology
1 answer:
Mariana [72]3 years ago
4 0

<u>Answer:</u>

<em>In a cross-site request forgery, browser </em><u><em>Link</em></u><em> help send a forged HTTP request.</em>

<u>Explanation</u>:

<em>CSRF is a kind of attack which compels the user to click on the unwanted links </em>or make him to perform some actions on the browser which the user is not intended to do so.

<em>They mainly target on Change request such as fund transfers, modifying their mail id’s etc</em>.

So they do all things by knowing Social engineering tricks and transfer the control of the <em>user to one another application created by the hackers and obtain the information and it is not just for theft of data. </em>

You might be interested in
What additional uses of technology can you see in the workplace? List ways technology impacts
7nadin3 [17]

People can be making the technology, technology can be used to help solve problems and help further educate people with what they are working on. Technology impacts agriculture because their are certain technology to help farmers farm fast and help water the land without needing a human to do it. Technology can help finance by helping people add and subtract rather than doing in their hand.

5 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while
VashaNatasha [74]
  • You can get a antivirus subscription that will kill malwares
  • Also, you can avoid going on websites you don't trust
  • I hope this helps you.
4 0
3 years ago
The responsibilities of the IT department and the needs of the user departments may cause conflicts over A. the color of the use
monitta

I'd say B: the amount and type of security placed on an application.

This is a common problem that exists between IT and other user departments. The IT department is well known for closing up certain sites and applications needed by other departments all in the name of security. As a result, it might slow down operations within different department and may cause inefficiency.

4 0
3 years ago
What is network topology​
Fynjy0 [20]
DescriptionNetwork topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial fieldbusses and computer networks.
3 0
3 years ago
Other questions:
  • Which of these is a major mobile game developer?
    15·2 answers
  • DOES ANYONE KNOW HOW TO CHAGE THE IP ON A COMPUTER?
    8·1 answer
  • You can use the bash shell to redirect standard output or standard error from the terminal screen using the ____ shell metachara
    15·1 answer
  • Objects of the calculator class require no additional information when created. define an object named calc, of type calculator.
    14·2 answers
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • What is the name for a hardcoded value entered into a formula ?
    8·2 answers
  • State why hexadecimal is used to display the error code
    11·1 answer
  • A _____ refers to a product or service, such as a technical report, a training session, a piece of hardware, or a segment of sof
    12·2 answers
  • Which would be the most efficient way to store files on your computer?
    14·1 answer
  • One way to check if a website is secure is to look for a/an<br> in the address bar.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!