1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
2 years ago
6

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre

ate nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack
Computers and Technology
1 answer:
adell [148]2 years ago
3 0

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

You might be interested in
An online supermarket wants to update its item rates during the sales season. They want to show the earlier rates too but with a
cupoosta [38]
Cheaper elements gives a strike through appearence
7 0
3 years ago
Read 2 more answers
An array of integers can be assigned to a memory address in the ...
fenix001 [56]

Answer:

A :)

Explanation:

8 0
2 years ago
What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
Sever21 [200]
The money their making
6 0
3 years ago
True or False: Unity can apply multiple textures to a single object or terrain
MaRussiya [10]
This is very true unity is what u said and it is the definition of this
3 0
3 years ago
What three files do you need to perform a mail merge?<br><br> HELP ASAP PLEASE!!
Burka [1]

The 3 files you need to have for a successful mail merge are:

  • An Excel spreadsheet works
  • Outlook Contact List.
  • Apple Contacts List or Text file, etc.

<h3>What is Mail Merge?</h3>

This is known to be the act of carrying out  a Mail Merge and it is one where a person will need to use a Word document and a recipient list, that is an Excel workbook.

Files needed are:

  • Text file,
  • address files, etc.

The 3 files you need to have for a successful mail merge are:

An Excel spreadsheet worksOutlook Contact List.

Apple Contacts List or Text file, etc.

Learn more about mail merge from

brainly.com/question/20904639

#SPJ1

4 0
1 year ago
Other questions:
  • A very simple device that connects network components and sends packets of data to all other connected devices is called a _____
    5·1 answer
  • Hilary works at Klothes Kloset. She quickly helps the customers, and her cash drawer is always correct at the end of her shift.
    9·1 answer
  • Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two
    11·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Which country was the first in the world to launch a mass media campaign in response to population growth?
    14·1 answer
  • What are the characteristics of a good text-based adventure game? In other words, what are some features that should be in the g
    7·1 answer
  • How has technology impacted our lives and the world we live in? In your own words.
    9·1 answer
  • You are a developer for a news, entertainment, lifestyle, and fashion website. User traffic has steadily increased month-over-mo
    11·1 answer
  • Animals living in burrows under the ground is an interaction between the biosphere and the
    11·1 answer
  • One word for The characters typed by a user using a<br> keyboard.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!