1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
2 years ago
9

Match the following ____________________ is a situation where someone examines all the network traffic that passes their NIC, wh

ether addressed for them or not. Answer 1 Choose... A(n) ____________________ is a 32-bit number established by the host that is incremented for each packet sent. Answer 2 Choose... ____________________ is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users Answer 3 Choose... A(n) ____________________ is a connection to a Windows interprocess communications share (IPC$).
Computers and Technology
1 answer:
earnstyle [38]2 years ago
7 0

Answer:

1. Sniffing.

2. Sequence number.

3. Phishing.

4. Null session.

Explanation:

1. Sniffing is a situation where someone examines all the network traffic that passes their NIC, whether addressed for them or not.

2. A sequence number is a 32-bit number established by the host that is incremented for each packet sent. It can be used by a computer administrator or network engineer to reorder packets.

3. Phishing is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users. Informations such as password, credit card details and other personal information can be gotten by an attacker through this process.

4. A null session is a connection to a Windows interprocess communications share (IPC$). A hacker can use a null session to gain unauthorized access to informations such as security settings, registry settings, username (User ID) about an end user.

You might be interested in
What are the nuclear codes?
inn [45]

Answer:

Nuclear codes allow the president to prove the individual is authorized to order the launch.

Explanation:

Hope this helps!

If not, I am sorry.

3 0
1 year ago
Which step in the software development life cycle involves making improvements based on user feedback?
Dima020 [189]

Answer:

The step is Testing oki doki

6 0
3 years ago
If you wanted to create a line of code that would add ten to the user’s current score, which code should you use?
Korvikt [17]

Answer:

choice c

Explanation:

score = score + 10

because the rest doesn't make since and score == score + 10 has an extra equal sign.

7 0
3 years ago
Read 2 more answers
Narrate an incident from the experience of a 14 year old girl which brings out the message: " Never leave till tomorrow what you
pogonyaev
Smth called google turbo record United in
7 0
2 years ago
A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
masha68 [24]

This is a trojan horse type of virus.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • In the digital age we have less time to absorb and make sense of new information
    12·2 answers
  • Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
    11·1 answer
  • For the recursive method below, list the base case and the recursive statement, then show your work for solving a call to the re
    8·1 answer
  • What are some good digital habits?
    5·2 answers
  • To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationship
    11·1 answer
  • Which describes the Paradox of Automation?
    5·2 answers
  • which filename refers to a 16-bit real-mode program that queries the system for device and configuration data, and then passes i
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!