1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
6

A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that

followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Computers and Technology
1 answer:
Korvikt [17]3 years ago
5 0

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

You might be interested in
Electronic type is often considered to be the latest step in the evolution of the written ______________.
Allisa [31]
It isn’t people but im really confused. I think its A but dont come at me if its wrong
4 0
3 years ago
I recently fixed my computer's hard drive, and when I rebooted my comp., the mouse and keyboard won't work. The keys work when i
dezoksy [38]
Just simply do a hard reset, all your data will be lost but i think it will work, with my computes passed the same.
5 0
4 years ago
Press the enter key in all of the following circumstances except _____.
fiasKO [112]
B. When the insertion point reaches the right margin 
6 0
3 years ago
Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n
Jobisdone [24]

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

8 0
3 years ago
If a business industry does not meet OSHA standards
soldi70 [24.7K]

Explanation:

USE SOCRACTIC IT WOULD REALLY HELP

7 0
4 years ago
Read 2 more answers
Other questions:
  • Match the job skills with the correct job role.
    12·1 answer
  • Write an UPDATE statement that modifies the InvoiceCopy table. Change the PaymentDate to today’s date and the PaymentTotal to th
    7·1 answer
  • The sequence of folders to a file or folder is called a(n) ________
    8·1 answer
  • . A double is more precise than a float... true or false?
    12·1 answer
  • PLS ANSWER ASAP I WILL GIVE BRAINLIEST
    11·1 answer
  • the id selector uses the id attribute of an html element to select a specific element give Example ?​
    11·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • WHHY AM I GIVING POINTS AWAY
    7·1 answer
  • I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding
    8·2 answers
  • PYTON CODERS I NEED HELP I WILL GIVE BRAINLIEST!!! Why is this python code giving me problems?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!