1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
6

what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another I

P address
Computers and Technology
1 answer:
Ber [7]3 years ago
5 0

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.

You might be interested in
I love dog my is 16 weeks old how old is yours
attashe74 [19]
I don't like dogs so I don't have one but if I did I think it would have been dead anyway
5 0
3 years ago
Jabria are you smart
kiruha [24]

Answer:

A. YESSSSSS

Explanation:

8 0
3 years ago
Read 2 more answers
Create a multimedia project that contains the text element and all the contents that you have studied about that element
Marrrta [24]

Answer:

no sé jejejejeje

lslsl

lonsinet

ko

8 0
3 years ago
Which type of address defines a single network interface in a computer or other device?
White raven [17]
MAC address
......... ..
4 0
3 years ago
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
Ymorist [56]

Answer:

tiddies

Explanation:

sukk

3 0
3 years ago
Other questions:
  • The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16,
    9·1 answer
  • Due to the internal style sheets of some browsers, your website may look different to someone who is using firefox as opposed to
    11·1 answer
  • What is FireWire?
    7·2 answers
  • When did the digital revolution begin
    10·1 answer
  • Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
    6·1 answer
  • What is the main feature of chat rooms?
    9·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an <br> ___?
    14·1 answer
  • A browser allows you to set preferences for using the browser. These preferences include all of the following except
    7·1 answer
  • Which of the following tools enables a production mixer to sync audio and video?
    7·1 answer
  • You have been elected to assist the school's yearbook committee and newspaper club in purchasing new computers. The current comp
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!