1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anastaziya [24]
3 years ago
6

In what way. If any, does click-lacking differ from cross-site scripting?

Computers and Technology
1 answer:
lozanna [386]3 years ago
7 0

Answer:

In cross-site request forgeries, the user's web browser acts as the confused deputy, where as in clickjacking, the user is the confused deputy.

Explanation:

You might be interested in
What type of lens was used to take this picture?
Leona [35]

Fish-eye because this is how you would see through a "fish eye" point of view in a rounded tank that is commonly used.

May I please have brainliest

4 0
4 years ago
5) How is the operating system on a desk top computer different from the operating system on a smart phone?​
lesya692 [45]
The difference is that system on a desk top preforms all the basic tasks like file management, memory management handling input and output and controlling peripheral devices such ad disk and printers where as some smart phone work on specific hardware
6 0
3 years ago
Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
Mars2501 [29]

Answer:

Chief Information Security Officer (CISO)

Explanation:

One of the senior executive officers in an organization is the Chief Information Security Officer (CISO). Sometimes referred to as the Chief Security Officer (CSO), the responsibility of the CISO is to ensure the security of an organization's business systems and develop strategies to safeguards these systems against malicious intruders such as hacker and viruses.

This role is a very crucial one in any organization especially those that run on IT infrastructures. Not only do they ensure security, they also work together with certain staff such as security directors and managers in the organization, in order to come up with decisions that will add value to the organization and give it some competitive edge over other organizations.

6 0
4 years ago
You can only create one document from a template true or false
8090 [49]

Answer:

good to kow

Explanation:

5 0
3 years ago
Read 2 more answers
I losanh.
kolezko [41]

Answer:

two

Explanation:

7 0
3 years ago
Other questions:
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • Which of the following file formats is used for art work
    11·1 answer
  • A must decode this code. I guess is not a Cesar. The last line is a email adress.
    15·1 answer
  • A report that ends with the author providing his or her plan for next steps is considered a
    5·1 answer
  • Which is the most effective manner to deliver a speech inmost business settings?extemporaneous presentationmemorizationreadingvi
    9·1 answer
  • Why is my computer acting up?
    14·1 answer
  • Apple's macos and microsoft windows are examples of ________ software. select one:
    8·1 answer
  • True or False: <br> The object reference can be used to polymorphically store any class in Java.
    13·1 answer
  • Paula needs to ensure that an animation she has created is repeated. Which option should she use to achieve this?
    8·1 answer
  • Write the code to call a CSS file named "exam.css".
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!