1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
8

The basic idea behind DNSSEC is a. providing name resolution from a hostname to an IP address b. ensuring that only local author

itative nameservers have the authorization to contact nameservers higher in the hierarchy (i.e., TLD nameservers, root nameservers) c. encrypting each DNS response so that it cannot be read by a third-party d. authenticating that the data received in a DNS response is the same as what was entered by the zone administrator (i.e., the response has not been tampered with)
Computers and Technology
1 answer:
valentinak56 [21]3 years ago
6 0

Answer:

authenticating that the data received in a DNS response is the same as what was entered by the zone administrator

You might be interested in
. List 5 types of exploits from cybercrime and provide brief definition. (2.5 Marks)
Flura [38]

In cyber security, an exploit is a way attackers take advantage of certain vulnerabilities and gain malicious access to systems. There are very many types of exploits that exist in the cyber security world. However, I will mention those ones most commonly used.

DoS attacks – The denial of service attacks is very common. Hackers will gain access to servers and send so many packet requests at the same time. The servers become overwhelmed due to too much memory allocation and the huge amount of traffic ends up crashing the servers.

Unauthorized access – When an attacker has an illegal access to host machines

<u>Application Exploitation</u>

Code injection – This exploit can be used to maliciously inject invalid code into an application program or software and as a result change how the program behaves.

Cross-site scripting – Enable hackers inject malicious scripts on a website of a client. Once they have gained access, they will escalate their privileges and have more access to the site.

Clickjacking – A type of attack that tricks unknown victims into clicking links of a web page they believe are legitimate and end up revealing confidential information of themselves.

6 0
4 years ago
PLEASE HELP QUICK WILL GIVE BRAINLY
kipiarov [429]

Answer: Where the guide lines?

Explanation: I’ll help but where the guidelines?

7 0
3 years ago
Why are typewriter keys arranged the way they are?
loris [4]
They are arranged the way they are because of the QWERTY layout. It was used to slow down how people typed so they wouldn't get the typewriter jammed. Hope this helps. :)
4 0
4 years ago
Which of the following tasks requires you to use the Tabs option?
Monica [59]
Indenting a paragraph :)
7 0
4 years ago
1. A truck leaves a stop sign and accelerates uniformly over a time of 5.21 seconds for a
Rufina [12.5K]

Answer:

1, is 21.11 meters per second.

110/5.21

Explanation:

3 0
3 years ago
Other questions:
  • What will happen if you change data that is used in a formula
    10·1 answer
  • What is the full word of"VPN"?​
    15·2 answers
  • How are clustering and Network Load Balancing similar?
    13·1 answer
  • How designers have created products from waste materials?
    7·1 answer
  • Steps in the systems development life cycle​
    15·2 answers
  • What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network
    5·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    9·1 answer
  • If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:
    14·1 answer
  • Why are formulas used in spreadsheets?
    10·1 answer
  • _____ refers to the programs that a device can run.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!