1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sdas [7]
3 years ago
6

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre

ate nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack
Computers and Technology
1 answer:
adell [148]3 years ago
3 0

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

You might be interested in
A seismograph has a heavy weight that is hung from a spring. What would happen if the weight were attached to a rod instead of a
Goshia [24]
<h2><u>Answer:</u></h2>

A seismograph has an overwhelming weight that is swung from a spring. As the spring is high touchy to the developments of the Earth at that point is the correct decision offer a seismograph.

On the off chance that this is changed by a pole, at that point it won't see the developments of the earth making the seismograph not precise and it would not work.

6 0
3 years ago
You must receive an invitation in order to join Pinterest. True or False?
malfutka [58]
That is false, Pinterest is a free website that anyone can join!
3 0
3 years ago
Read 2 more answers
What is the term for an individual who evaluates website statistics to determine the site’s effectiveness?
Sati [7]

Answer:

Web site analyst

Explanation:

Website analyst main goal is to gather data from website and based on that data take decision to improve website design, user experience or content to improve user experience. More over on the basis of data gathered from website they design different marketing strategist for the organization.

4 0
4 years ago
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
Identify the first step in the process of setting margins.
olga55 [171]
Read the whole passage first then go back and the margin is supposed to be the main idea of the thing you are reding

7 0
4 years ago
Other questions:
  • Copying and pasting from the internet can be done without citing the internet page, because everything on the internet is common
    13·1 answer
  • Write the declaration statement for a two-dimensional array X of integers with five rows and five columns that accepts 25 intege
    5·1 answer
  •   Why does a shaded-pole motor run at a constant speed?  A. The lines of force do not change direction.  B. The current through
    15·1 answer
  • Explain the five design principles that cartographers use when designing a map.<br>HELP ASAP
    7·1 answer
  • Luchen Modo, a software development firm in Asia, launched a new software for smartphones that allowed users to remotely control
    11·1 answer
  • Write a class Example() such that it has a method that gives the difference between the size of strings when the '-' (subtractio
    6·1 answer
  • Which of the following is a Microsoft solution
    11·1 answer
  • How many characters should a strong password have? four six eight ten
    10·2 answers
  • Write a script that checks to see if at least one argument has been given on the command line and tests whether the argument is
    5·1 answer
  • What type of malicious software tries to gather information about you without your consent?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!