1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
6

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre

ate nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack
Computers and Technology
1 answer:
adell [148]3 years ago
3 0

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

You might be interested in
What will you better be prepared for by learning about the animals you photograph
krek1111 [17]

D. All of the above.

Makes the most sense! :3

6 0
3 years ago
Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year
AleksAgata [21]
It really depends on your type of data, if it's sensitive data or not. And it also depends on what type of backup (Incremental, Decremental, etc.). But you should aim to backup at least once a week, and also do a backup of your original backup.
6 0
3 years ago
Read 2 more answers
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
What: A challenging question on this module's material.
Alekssandra [29.7K]

Need further information!!!

6 0
3 years ago
Use the following scale to rate yourself: (There is no wrong answer
Law Incorporation [45]
Doesnt have any picture
8 0
3 years ago
Other questions:
  • business owners and managers may first balk at the idea of mobile officer workers because there may appear to be a lack of ___ w
    9·1 answer
  • Why is peer answer always not working? just wondering idk why
    7·2 answers
  • Mention five features of word processing application​
    10·1 answer
  • T F The exit function can only be called from main .
    10·1 answer
  • Please create C program, the task is to implement a function edoublepowerx that has an input parameter x of floating-point value
    11·1 answer
  • Rounding up and down for 389,422
    7·1 answer
  • Discuss two basic types of monitors CRT and LCD give me in short ​
    9·2 answers
  • What is the main difference between a search engine and a web browser?
    6·2 answers
  • HELP!!!!!!!
    8·1 answer
  • Which of the following is NOT an algorithm?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!