1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
6

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that

followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Computers and Technology
1 answer:
Korvikt [17]3 years ago
5 0

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

You might be interested in
Select the correct answer.
aliina [53]

Answer:

B

Explanation:

engineers design and carry out test cases and evaluate exit criteria (by following the scope set in the planning phase). They create bug reports describing detected defects and report to the stakeholders on the test findings and the completion status. Testing may be repeated to check for errors.

7 0
3 years ago
What year does futurist ray kurzweil believe ai will meet human intelligence?.
Paladinen [302]

Answer:

2029

Explanation:

Kurzweil claims that a machine will pass the Turing test by 2029.

3 0
3 years ago
Read 2 more answers
Why is Data-Driven Analytics of interest to companies?
vivado [14]

Answer:

It allows companies to make definitive predictions about the future. It gives companies the ability to make informed decisions.

It helps Data Analysts shape an analytics problem from a business problem.

Explanation:

4 0
3 years ago
Which is NOT true?<br> 9 + 4 = 17 - 4<br> 8 + 7 = 14 + 3<br> 11 = 19 - 8<br> 5 + 8 = 20 - 7
Fudgin [204]

Answer:

B 8 + 7 = 14 + 3

Explanation:

7 0
3 years ago
Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within
Zolol [24]

Answer:

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Explanation:

You will write a flowchart, and C code for a program that does the following:1. Within main(), it asks for the user’s annual income.2. Within main(), it calls a function called printIt() and passes the income value to printIt().  3. The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message.  If the income is not over 90000, it prints a message of encouragement, like “You WILL make $50,000, if you keep going.”Here is what the output looks like.File SubmissionUpload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

8 0
3 years ago
Other questions:
  • A DSLR camera is made up of two parts. They are
    13·2 answers
  • We discussed in class the differences between Ruby and a language like Java. Based on our discussions, when do you feel it would
    11·1 answer
  • A computer professional who has access to sensitive information shares this information with a third party. Which professional c
    9·2 answers
  • Read the sentence.
    10·1 answer
  • write an algorithm that gets two values: the price for item A and the quantity purchased. The algorithm should then print the to
    13·1 answer
  • Jennifer has her own business. Recently, she has ventured into creation of a new line of apparel. She has created a new symbol t
    14·2 answers
  • What do you understand by Multiprotocol Label Switching, how it works and is helpful in today's network scenario.
    15·1 answer
  • Assume that processor refers to an object that provides a void method named process that takes no arguments. As it happens, the
    7·1 answer
  • 1. In platform construction, wall-framing members include sole plates,
    15·2 answers
  • Which of the cached information retrieved will be the same as what is stored in the original server where the data is maintained
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!