1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
8

A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho

oting process, the network administrator notices that the web gateway proxy on the local network has signed all of the certificates on the local machine. Which of the following describes the type of attack the proxy has been legitimately programmed to perform? A. Transitive access B. Spoofing C. Man-in-the-middle D. Replay
Computers and Technology
1 answer:
Elza [17]3 years ago
7 0

Answer: C) Man-in-the-middle

Explanation: Man-in-the-middle attack is the attack where the hacker or attacker receives and passes on communication by manipulating it between victim and entity. These two parties have the middle-man who can alter the communication secretly , without the knowledge of other parties.

The situation mentioned in the question is also similar where the   every certificate on network seems to be signed ,which was not communicated or done by the proxy server or network administrator actually.

Other options are incorrect because transitive access is misusing the access and control leading to information risk. Spoofing is disguising of hacker into reliable device for hacking information. Replay is the playing the content again in repetition.Thus , the correct option is option(C).  

 

You might be interested in
What your computer can do to you?
hjlf

Answer:

it can blind you because too much light in ur face is bad

Explanation:

6 0
3 years ago
Read 2 more answers
Match the IP Protections Patent, Copyright and Trademark into the following cases:
Vesna [10]

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

8 0
3 years ago
To create a query string, you add a ____ immediately after a url, followed by the query string.
salantis [7]
The answer is question mark (?).  To create a query string, you add a question mark (?) immediately after a url, followed by the query string.
5 0
3 years ago
A rectangular drawing object in which text or graphic images can be inserted and positioned anywhere on a page.
Julli [10]
Its b,because the sentence describes a text box so well,plus im in digital art
6 0
3 years ago
Convert hexadecimal number 1AF2 to a decimal number.
dalvyx [7]

Answer:

6898

Explanation:

Given that 1AF2 is a hexadecimal number.

We have in hexadecimal, the digits are 0,1,2,3...9, A,B,C,D,E,F for the 16 digits used.

Using the above we say in the given number, we have

2 in units column

F in 16 column

A in 16 square column

and 1 in 16 cube column

Place value= 2(1) +15(16)+10(16^2)+1(16^3)\\= 2+240+2560+4096\\=6898

Hence 1AF2 = 6898 in decimal

8 0
3 years ago
Other questions:
  • The sound cards is a digital to____________ converter.
    11·1 answer
  • How does an ALU perform logical operations?
    6·1 answer
  • Which of the following statements are true regarding Steve Jobs and Steve Wozniak? Select 3 options.
    5·2 answers
  • Fazer um programa em C++ que contenha 3 funções sendo:
    11·1 answer
  • python Write a program that will take a file named Celsius.dat that contains a list of temperatures in Celsius (one per line), a
    9·1 answer
  • Say you write a program that makes use of the Random class, but you fail to include an import statement for java.util.Random (or
    10·1 answer
  • What is text box and label control​
    10·2 answers
  • Which of the following skills do employers in any field expect their employees<br> to have?
    5·1 answer
  • You use a 1200 watt hair dryer for 10 mintues a day.
    7·1 answer
  • How does the internet works
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!