1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
6

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre

ate nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack
Computers and Technology
1 answer:
adell [148]3 years ago
3 0

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

You might be interested in
Cách soạn thảo văn bản trên word
pickupchik [31]

Answer:

Did you mean How to edit text on word? There are 2 word, Microsoft Word Office and WordPad. The step I give you below is for both.

Explanation:

Steps to edit text on word

Step-1: Select the text you want to edit.

Step-2: Click on Home Tab.

Step-3: Select the style(s) you want to edit from the Font group

8 0
3 years ago
In the MARS Marketing Management Simulation, the results of your marketing mix decisions:
azamat
C- are only occasionally affected by the decisions made by other teams
explanation
idk
3 0
3 years ago
Which of the following is NOT an advantage of central management of information systems in the University System of Georgia? (A)
zzz [600]

Answer:

Independence

Explanation:

Management information system (MIS) is the system that acts as the backbone of an organization's activities, holding everything together. According to my research on MIS, I can say that based on the information provided within the question the one term that is not considered an advantage would be Independence. Since MIS doesn't really provide independence since the organization depends on the system.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Hi there are many annoying people in brainly making my head ache
iris [78.8K]

Answer:

Lol who is bothering you?

Explanation:

4 0
3 years ago
Read 2 more answers
The most infuential programming language is ______.
Oksi-84 [34.3K]

Answer: the most influential programming language is Java script

Explanation:

3 0
3 years ago
Other questions:
  • Which computer device works like the human central nervous system by connecting all the computer’s parts together and allowing t
    9·1 answer
  • Anchor hyperlink to position the cursor to the section called sisters? i need a code pls
    15·1 answer
  • You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to
    13·1 answer
  • The java compiler requires that a source file use the ________ filename extension question 3 options: 1) .class 2) .h 3) .java
    8·1 answer
  • 25 POINTS + BRAINLIEST PLS HELPWhere should you put the argument for a command?
    13·1 answer
  • Given the strings s1 and s2 that are of the same length, create a new string consisting of the last character of s1 followed by
    10·1 answer
  • If I'm screen sharing and I plug in a HDMI, will it screen share what the HDMI is plugged into, and can you talk at the same tim
    11·1 answer
  • Corey set up his presentation for delivery to his team.
    8·1 answer
  • Joe has just started the Security Module. He wants to get through it as quickly as possible and take the Quiz. As he clicks thro
    11·1 answer
  • Which of the following could be part of an algorithm?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!