1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
2 years ago
7

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su

re their nics is not running in promiscuous mode
Computers and Technology
1 answer:
andrew11 [14]2 years ago
4 0

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

You might be interested in
4. A computer architect boasted that they were able to design a computer in which every instruction occupied exactly thirty-two
Mariana [72]

Answer:

Advantages include;

1. It would take up less space.

2. Programs may require far less memory to run.

3. Less power wastage

Explanation:

Advantages include;

1. It would take up less space.

2. Programs may require far less memory to run.

3. Less power wastage

6 0
3 years ago
Which structural semantic will this HTML code snippet form?
Yakvenalex [24]

Answer:

D. Block

Explanation:

Semantic HTML or semantic markup is HTML that introduces meaning to the web page rather than just presentation. For example, a <p> tag indicates that the enclosed text is a paragraph. This is both semantic and presentational because people know what paragraphs are, and browsers know how to display them.

3 0
3 years ago
ask user to input a string. (assume length of input string is 1) If the string is lower case, print its upper case If the string
Helga [31]

Answer:

import java.util.*;

import java.util.Scanner;

class Main

{

public static void main(String[] args) {

System.out.println("Enter String");

Scanner sc1=new Scanner(System.in);

String s1= sc1.nextLine();

boolean b= isNumerc(s1);

if (b== true)

{

    System.out.println("Its number: Sorry");

}

else

{

boolean a=isStringUpperCas(s1);

if(a == false)

{

    System.out.println(s1.toUpperCase());

}

else

{

    System.out.println(s1.toLowerCase());

}

}

}

private static boolean isStringUpperCas(String st1){

     

     

      char[] arr = st1.toCharArray();

     

      int k =0; boolean flag=true;

      while(k<arr.length)

      {

         

          if( Character.isUpperCase( arr[k] ))

          {

              flag=true;

              k++;

          }

          else

          {

              flag=false;

              k++;

          }

         

      }

      return flag;

}

             

  public static boolean isNumerc(final String st1) {

     

      if (st1 == null || st1.length() == 0) {

          return false;

      }

      for (char ch : st1.toCharArray()) {

          if (!Character.isDigit(ch)) {

              return false;

          }

      }

      return true;

  }

 

}

Explanation:

Please find the program above.

8 0
3 years ago
What type of system security malware allows for access to a computer, program, or service without authorization?
olasank [31]

Answer:

"backdoor" is the correct answer for the above question

Explanation:

  • The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.
  • It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.
  • The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.
7 0
4 years ago
Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is ide
ANEK [815]

Answer:

A

Explanation:

3 0
3 years ago
Other questions:
  • What Are the main reasons students take the SAT/ACT?
    15·1 answer
  • What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
    14·1 answer
  • Whats the relationship between cpu memory and disk​
    10·1 answer
  • An ideal line length would include how many characters? A. 6570 B. 100 C. 100125 D. 4055
    8·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • Describe the difference between information poor and information rich society?​
    9·1 answer
  • One of the earliest computer networks was the ARPANET, developed in the early 1960s. The purpose of this network was to:
    13·2 answers
  • What type of program would you use to create a personal budget?
    15·1 answer
  • Questions: What memory modules are needed if the customer wants 3 GB of RAM? What capacities and how many modules of each capaci
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!