1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
boyakko [2]
3 years ago
6

what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another I

P address
Computers and Technology
1 answer:
Ber [7]3 years ago
5 0

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.

You might be interested in
In the program evaluation and review technique (PERT), a delay in ________ will cause the entire project to fall behind. Multipl
sweet [91]

There are different kinds of program. In the program evaluation and review technique (PERT), a delay in a critical path will cause the entire project to fall behind.

<h3>What is program evaluation and review technique?</h3>

Program Evaluation Review Technique (PERT) is known to be a statistical tool that is often used in project management.

It is said to be created so as to help analyze and represent the tasks that is used in completing a said project. ​If any task along a critical path is said to fall behind a specific schedule, the entire project have to be delayed.

learn more about  program evaluation from

brainly.com/question/13171394

4 0
3 years ago
Cookies Are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day
ivanzaharov [21]

Answer:

As we can see that there are limited application requirements in this case, an ordinary broadband would be enough for the file transfer of daily information to the headquarter. If broadband is not available, dial up internet would do the job.

In my opinion Star Architecture could be another option to use in such situations. Start architecture has a dedicated circuit and it has the capability to route all messages from a central location in a network to client computers.

Explanation:

6 0
4 years ago
A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
Kazeer [188]

Answer:

The Local site's URL should be added to the Local internet zone.

Explanation:

3 0
3 years ago
How do you change your name on brainly after you have made an account​
zhuklara [117]

Answer:

u have to contact brianly and tell them that u accidentally made a different account name then the 1 u want

5 0
3 years ago
A cell reference =SUM(sheet1.A1,sheet 2.A2) will place the results in which of the following, the current worksheet, worksheet 1
kozerog [31]

Answer:

the current worksheet

Explanation:

However, the syntax mentioned is incorrect. It should be

=SUM(sheet1!A1,sheet2!A2)

The above is the correct syntax, And this will print the sum in the sheet that we are in currently. And hence, the correct option for this question is certainly the current worksheet. Hence, the option mentioned in the answer section is the correct one.

3 0
4 years ago
Other questions:
  • Describe a situation where it would be advantageous to use the copper tape or aluminum foil instead of the A and B push buttons
    7·2 answers
  • For a panoramic photograph, you will more than likely want to control the exposure of the photograph yourself rather than lettin
    11·1 answer
  • Datta Computer Systems is considering a project that has the following cash flow data. What is the project's IRR? Note that a pr
    10·1 answer
  • A spreadsheet is a software program for storing, managing, and retrieving information. true or false?
    15·2 answers
  • python A pet shop wants to give a discount to its clients if they buy one or more pets. The discount is equal to 20 percent of t
    12·1 answer
  • The idea of supply and demand is based on the development of
    10·2 answers
  • You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solu
    8·1 answer
  • A domain name is used to: *
    15·1 answer
  • (ORAL COMMUNICATIONS)- I just need someone to please check if my answers are correct, and if not, please correct me :)
    8·1 answer
  • What allows a programmer to write code quickly and efficiently for an action that must be repeated?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!