1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
13

In a cross-site request forgery, what components help send a forged HTTP request? In a cross-site request forgery, browser _____

__ help send a forged HTTP request.
Computers and Technology
1 answer:
Mariana [72]3 years ago
4 0

<u>Answer:</u>

<em>In a cross-site request forgery, browser </em><u><em>Link</em></u><em> help send a forged HTTP request.</em>

<u>Explanation</u>:

<em>CSRF is a kind of attack which compels the user to click on the unwanted links </em>or make him to perform some actions on the browser which the user is not intended to do so.

<em>They mainly target on Change request such as fund transfers, modifying their mail id’s etc</em>.

So they do all things by knowing Social engineering tricks and transfer the control of the <em>user to one another application created by the hackers and obtain the information and it is not just for theft of data. </em>

You might be interested in
Which of the following is a central feature of agroup?interactionmutual influenceinterdependenceall of the given options
elena55 [62]

Answer: All of the above

Explanation: A group is considered as the collection of two or more constituents/individuals. The characteristics of the a group are interaction , interdependence,interaction etc. There is a sense of responsibility and trust to work to achieve goal by depending on each other is described as the interdependence and for this interaction between group is needed as to maintain good communication and also there is a influence of each other on each group member.

3 0
4 years ago
In the 21st century organization we will see:
kykrilka [37]

Answer: All of the above

Explanation: As the technology is getting improved and advanced time to time, it will put a huge impact on various sections of organization.

The advancement in the IT infrastructures will be seen by the improvement in the software,networks, data centers, hardware etc and their functioning.This will lead increase the focus of the technology towards the IT infrastructure.

Security is the feature that requires to be developed throughout the time as hacker and attackers come up with various attacks and other malicious activity to steal the confidential data and information .Thus security constantly needs to be improved and focused which will continue to happen in 21st century.

Business of organizations are becoming online and this will tend the organizations to become more indulged online business or e-business in future as it provides more benefits and vast coverage .Thus, all the options are correct.

5 0
4 years ago
How many keys are on a microsoft windows standard keyboard
DiKsa [7]

There are 101 keys on a microsoft windows standard keyboard

7 0
4 years ago
Read 2 more answers
Type the correct answer in the box. Spell all words correctly.
Tom [10]

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

8 0
4 years ago
Read 2 more answers
Write a Temperature class that will hold a temperature in Fahrenheit and provide methodsto get the temperature in Fahrenheit, Ce
julsineya [31]

Answer: Thermometer

Explanation:

5 0
4 years ago
Other questions:
  • Edmund wants to create a website for his university. He has created all the necessary content and now wants to style and format
    11·1 answer
  • Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.​
    10·1 answer
  • Which method is the best way to keep from running late on the day of a test
    10·1 answer
  • Which of these is not used by analysts when adopting CASE tools? (1 point) (Points : 1.5) communicating more effectively with us
    5·1 answer
  • How are blogs and wiki alike
    15·2 answers
  • Which of the following plug-ins was developed by microsoft and is a software development tool used to write and run internet app
    10·1 answer
  • Determine what is printed by the following code.
    8·1 answer
  • For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastruc
    7·1 answer
  • 1. Choose a real or made up company, and describe at least three ways in which the company uses technology. (1-3 sentences. 3.0
    13·1 answer
  • Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and m
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!