1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
3 years ago
15

On tool hackers use to get sensitive information from victims is/are:

Computers and Technology
2 answers:
Elena L [17]3 years ago
8 0
Absolutely c is the correct!
Feliz [49]3 years ago
5 0
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
You might be interested in
The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
lawyer [7]

Answer:

IDP sensors can be complicated.An open-source software program called snort program.

Explanation:

Snort is an open-source network intrusion detection system (IDS) and prevention system. It is created in 1998 by Martin. Snort's open source network-based can perform analysis and packet logging on an Internet Protocol network.

The snort program can be used to detect probes or attacks. Snort configured three modes

sniffer

pocket logger

network intrusion detection.

6 0
3 years ago
Read 2 more answers
Do you agree that digital signatures are the best way to protect the data in question?
lutik1710 [3]

Answer:

Explained

Explanation:

Yes, I agree that digital signatures are the best way to protect the data in the date in question. A digital signature is mathematical technique used to validate the authenticity and integrity of a massage. Digital signature is far more inherent security. It is built to solve problems of tempering and impersonation of digital documents. It allows the authorized user to have authentic right, and the unauthorized person is denied access.

3 0
3 years ago
The number of pixels displayed on the screen is known as ​
puteri [66]

Answer: Resolution

Explanation: The total number of pixels that can be displayed on the screen at a time is called the resolution of the screen. This resolution is normally described in the pair of numbers, such as 2560 x 1440. This means, the computer screen is 2560 pixels wide and 1440 pixels tall.

4 0
3 years ago
Help me plz What character must always be used when a formula is enter in a cell? (on a spreadsheet)​
lara [203]

Answer:

The equal sign "=" must be used.

Most, if not all, spreadsheet programs support formulas, but you must start them with an equal sign.

8 0
3 years ago
Complete the program segment below to write the numbers 1 through 50 to the numbers.txt file.
Ludmilka [50]

Answer:Usisksk

Explanation:

Js JSU’s

8 0
3 years ago
Other questions:
  • Describe the difference between Global knowledge and personal idea. Why is it important to give credit to others by citing their
    6·1 answer
  • Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
    9·1 answer
  • You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
    15·1 answer
  • All linear programming problems have all of the following properties EXCEPT
    9·2 answers
  • What is the reasoning you would write an inquiry to a company?
    5·2 answers
  • Connect 5 LEDs with any random colors. Iteratively, turn ON 1 to 5 LED(s) that will take 5 iterations in total, and in every ite
    6·1 answer
  • 4.2 lesson practice last one plzs help
    5·2 answers
  • 100 points for this and brainlyist lol
    11·1 answer
  • What is pollution?
    14·2 answers
  • Coffee shops worldwide throw away billions of paper cups each year. Discuss
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!