1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
6

what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another I

P address
Computers and Technology
1 answer:
Ber [7]3 years ago
5 0

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.

You might be interested in
It's not necessary in a field to have .
ozzi

it's not necessary in a field to have .

6 0
3 years ago
Who was Naruto's first kiss<br><br>A. Hinata<br>B. Sasuke<br>C. Sakura​
Amanda [17]

His first kiss was Hinata and it was also her first kiss as well mark me as brainliest please

Your answer is A

3 0
3 years ago
In what way(s) did the password you tried to use not meet the password policy requirements?
Gre4nikov [31]
Depends on the organization. Password policies differ between each organization. Generally on a mainstream point of view. Passwords should generally be complex. If your passcode is too short. This could pose a risk to your account and the companies data could be at risk.

Broad range of possible pass code rules that may be blocked.

7 character limit
Capital letter and/or number figure
No easy consecutive digit or character: e.g abcd1234
8 0
3 years ago
Clunker Motors Inc. is recalling all vehicles in its Extravagant line from model years 1999-2002 as well all vehicles in its Guz
Soloha48 [4]

Answer:

boolean recalled;

((modelYear>=1999 && modelYear<=2002 && modelName=="Extravagant") || (modelYear>=2004 && modelYear<=2007 && modelName=="Guzzler")) ? recalled = true : recalled =false

Explanation:

Using a combination of comparison operators and logical operators, the conditions stated in the question is captured in the code snippet with the boolean variable recalled also declared. Since we are not allowed to use the if statement, we have used the conditional or ternary operator that checks if a condition is true executes the statment that follows the question mark else it executes the statement after the full colon.

3 0
3 years ago
11. Written and artistic expressions are protected by
Lina20 [59]

Answer:

B

Explanation:

Written and artistic expressions are protected by intellectual property law.

8 0
2 years ago
Other questions:
  • Susan is in charge of the inventory reports for her company. She will need to find specific inventory items as well as project i
    8·1 answer
  • _____ is published by the U.S. Bureau of Labor Statistics. It provides up-to-date career outlook information. It is no longer av
    15·2 answers
  • Which program has an indexed version of the NIST NSRL of MD5 hashes that can be imported to enhance searching for and eliminatin
    10·1 answer
  • How are the stop lamp bulbs connected in relation to each other? a. In parallel. b. In series. c. In series/parallel. d. None of
    13·1 answer
  • What is the digital divide? What does the digital divide mean for the world?
    9·1 answer
  • Select the correct answer.
    9·2 answers
  • Es costoso construir un robot
    6·1 answer
  • What is the importance of shape in graphic design?​
    5·2 answers
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    13·1 answer
  • PLEASE HELP ME!!!!!! ITS FOR 100 POINTS AND BRAINLIEST!!!!!!!! NO ONE EVER WANTS TO ANSWER MY QUESTION!!! I JUST NEED SOMEONE TO
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!