1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
6

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre

ate nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack
Computers and Technology
1 answer:
adell [148]3 years ago
3 0

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

You might be interested in
Who was responsible for the development of the rocket motor?
kiruha [24]

Answer: Robert H. Goddard

Explanation: he developed and flew the first liquid-propellant rocket

6 0
3 years ago
Read 2 more answers
What is the basic purpose of the International Space Station that will be completed in 2010?
frosja888 [35]
The best and most correct answer among the choices provided by the question is the third choice "It will be a space laboratory for scientists"<span>

The main purpose of the International Space Station<span> is to provide an </span>international<span> laboratory for experiments within the </span>space<span> environment. Which, despite all our technological advances, is nearly impossible to replicate here on Earth.
</span>
I hope my answer has come to your help. God bless and have a nice day ahead!</span>
6 0
3 years ago
বর্তমান করােনার ন্যায় পরিস্থিতি অর্থাৎ স্বাভাবিক শ্রেণি কার্যক্রম পরিচালনা সম্ভব
Zarrin [17]

Answer:

ayo fam

Explanation:

I dont think this is supposed to be here lol

5 0
3 years ago
Read 2 more answers
How to connect canon printer to computer?
denpristay [2]
<span>Step 1Determine what type of connection you need for your computer and printer. If you see a large rectangular connection on your printer it is a parallel printer, and you will need to make sure you have a parallel port on your computer. This connection will be long and rectangular, and it may be red in color. If your Canon printer has a small square connection on the back it is a USB printer, and you will need to look for a flat slot on your computer to hook it up.Step 2Connect the printer and computer. If you are working with a parallel printer connect the large end of the cable to the back of the printer and the smaller end to the computer. If you have a USB printer, connect the square end of the cable to the back of the printer and the flat end to a free USB port on your computer.Step 3Turn on your printer and the computer. Insert the print cartridges that come with the printer. Watch the lower right-hand corner of your computer screen for a "found new hardware" message. This is your indication that the operating system has found your new printer and is installing the proper driver for it.Step 4Insert the CD that comes with your printer, if you are prompted to do so. If your operating system was unable to find a suitable driver it will prompt you for the CD. Keep your CD handy anyway, because you will need it to install the printer utilities.Step 5Insert the CD and allow it to install your printer utilities. After the utilities are installed you will be prompted to clean and align the print heads on your new printer. After the print heads have been aligned your new Canon printer will be ready for use.hope this helps</span>
7 0
3 years ago
How do i beat the wolf-sheep-cabbage game?<br> (it's a extra credit thing on my hw)
dolphi86 [110]
I use random buttons try that if not send me a link ill help
3 0
3 years ago
Other questions:
  • What does a graphic organizer do
    6·1 answer
  • The True Confessions of Charlotte Doyle begins with what is called a(n) _____.
    15·1 answer
  • Which of the following words is an anatomy for cautious
    14·1 answer
  • You're programming an infinite loop. What must you include in your code to prevent crashes?
    15·2 answers
  • Please check my answer! (Java)
    7·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
    9·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • What is an outcome in a game? Don't search google just give me an answer
    9·1 answer
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!