1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
5

Explain different types of networking-based attacks

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
4 0

Answer:

Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it

You might be interested in
Why is it hard for some people to keep a promise even one that they make to themselves​
tresset_1 [31]

Answer:

Awww what happened? Sometimes its hard for me to keep a promise.

Explanation:

7 0
3 years ago
Read 2 more answers
If you see these REPORT.
Alenkinab [10]

Answer:

ok will do

Explanation:

3 0
2 years ago
Read 2 more answers
How is distributed ledger technology (DLT) used in a blockchain?
andrey2020 [161]

Answer:

I believe the answer is D. To keep records of transactions in different places.

Explanation:

3 0
2 years ago
Which type of software is created on user dimension​
Ratling [72]

Answer:

Application and system software is created on user dimension.

6 0
2 years ago
Data in the form of digits is called
Flauer [41]
Numeric data because it consist of numbers
5 0
2 years ago
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • What are a few benefits of virtualization?<br> How do they benefit ?
    9·1 answer
  • To copy noncontiguous slides, open Slide Sorter view, click the first slide thumbnail, press and hold ____, click each additiona
    15·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • The item in this illustration that is highlighted is _____.
    11·2 answers
  • What is the function of a breadcrumb trail website
    7·1 answer
  • Using Phyton
    9·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • A string variable can hold digits such as account numbers and zip codes.<br><br> FALSE<br><br> TRUE
    14·1 answer
  • Aii so is anyone pushing P?<br> if u are u a g
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!