1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
5

an attack has changed the value of a variable used when copying files from one cloud server to a local drive. what is the most l

ikely motive behind the attack
Computers and Technology
1 answer:
BaLLatris [955]3 years ago
5 0

Based in the provided information, The attacker utilized integer overflow attack which could bring alteration to the state of the local drive's memory.

<h3>What is an attack in computer terms?</h3>

An attack can be regarded as violation of one's data or information on the computer system.

Since, the attacker, changed the value of a variable used when copying files from one cloud server to a local drive, his motive was alteration to the state of the local drive's memory.

Learn more about attack on drive at;

brainly.com/question/11352260

You might be interested in
Anyone here codes? <br> C++, C#, Lua? Anything?
Travka [436]

Answer:

IxxyzjgzkgzjgKfzkg v

jvljcljxkhxkgg/gjhkggzkykzkgjzjgggggzjgcufxu

Explanation:

nk yxthzefhGghghrhgzxhhsdgchiixxu

7 0
3 years ago
Read 2 more answers
If you have a list of words that you wish to make into a bulleted list, you must first highlight or ________ the words with your
motikmotik
<h3>Answer:</h3>

C. select

<h3>Explanation:</h3>

A. if you delete the words you can make them into a bulleted list

B. if you remove them you can make them into a bulleted list neither

D. Copying the words doesn't need for that

Hope it helped you

3 0
4 years ago
During an engine's intake stage, what passages inside the cylinder head of a gasoline powered engine must the incoming air-and-f
kow [346]
The intake ports must be open to allow fuel and oxygen to enter cylinder, then closes during compression. Your answer is A.
3 0
4 years ago
Arpenet was the computer created by the military true or false
Sphinxa [80]

True. It was a project that the pentagon was working on in the 60's

3 0
3 years ago
What permissions are needed in order to use a work online that is in the public domain?
Maurinko [17]
<h2 /><h2>⇒Written  \: permission  \: from \\  the  \: creator</h2>

The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.

5 0
3 years ago
Other questions:
  • Which charges a fee for access to read, research, or copy articles and other published materials?
    11·1 answer
  • Is LTE faster than 4G?
    8·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • To maintain her audience's confidence in her, what should kiara not do while delivering her presentation?
    6·2 answers
  • Which quality allows programmers to modify a program as and when required
    11·2 answers
  • The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the
    5·1 answer
  • Examples of websites that use . com
    10·1 answer
  • Help! ASAP! 1 Question.........°○°​
    11·1 answer
  • The BCD number for decimal 473 is( ). a) 111011010; b) 010011110011; c) 010001110011; d)0010110110​
    15·1 answer
  • When streaming video, data is temporarily stored in a
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!