what security issues could result if a computer virus or malware modifies your host file in order to map a hostname to another IP address

Answers

Answer 1

Answer:

Man-in-the-middle attack

Explanation:

In this type of attack, the hacker uses the virus or malware to get and change his IP address and hostname to match the address and hostname of the target host computer. The allows the hacker to gain access to information sent to the target IP address first.


Related Questions

a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​

Answers

Answer:

would it be term and tequnique?

Explanation:

oooooooo

What are the top ten famous games in the U.S.

Why? cause I wanna know :D

Answers

Minecraft

Fortnite

Rob.lox

GTA V

Rocket league

League of legends

Mario bros

GTA

Among us

Call Of Duty

How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three

Answers

Answer:

one i think

Explanation:

A production house needs an operating system that captures, saves, and generates information within specific time. Which type of operating system should the production house choose?

Answers

Answer:

A real-time operating system

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions. Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

There are different types of operating systems (OS) based on their functions and these includes;

I. Simple Batch System.

II. Multiprocessor System.

III. Desktop System.

IV. Multiprogramming Batch System.

V. Distributed Operating System.

VI. Network System.

VII. Realtime Operating System.

In this scenario, a production house needs an operating system that captures, saves, and generates information within specific time. Therefore, the type of operating system that the production house should choose is a real-time operating system.

A real-time operating system can be defined as an operating system (OS) that provides services to a system as they are required, without any form of delay or buffering of data.

According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?

Answers

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

Which 3 statements are true about journal entries? (Quick Books)

(Select all that apply)

1.Total debits must equal total credits

2.You can post to Products and Services in a journal entry

3.When posting to the accounts receivable account, you must specify a vendor

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Answers

Answer:

1.Total debits must equal total credits

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Explanation:

1.

A Journal entry follows the concept of double-entry. In the double-entry principle, a debit entry equals a credit. After posting all the required entries total debits are equal to the total credits.

4.

The business makes sales to customers. Some sales are made on cash or some are made on credit. In the case of credit sales, the receivables are made. To record the credit sale entry we must specify the customer in the debit entry against the credit entry of sales.

5.

in recording the credit sales or purchases multiple receivable or payable accounts can be used and a single entry of sales of purchases can be posted against these accounts. For example

Journal Entry with multiple receivables accounts.

DR. Customers A $1,000

DR. Customers B $2,000

DR. Customers C $3,000

CR. Sales ______$6,000

The three statements that are true about journal entries are:

Total debits must equal total credits.When posting to the accounts receivable account, you must specify a customer.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

According to the question, we are to discuss about journal entries which is used in financial accounting.

As a result of this we can see that in journal entries When posting to the accounts receivable account, you must specify a customer.

Therefore, in journal entries Total debits must equal total credits.

Learn more about journal entries at;

https://brainly.com/question/25372704

The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.

Answers

Answer:

The body tag

Explanation:

HTML has several tags; however, the tag that handles the description in the question is the body tag.

It starts with the opening tag <body> and ends with closing tag </body>

i.e.

<body>

[Website content goes in here]

</body>

Any text, image, object etc. placed within this tag will be displayed in the website

Write a function called is_even that takes one parameter and returns a boolean value. It should return True if the argument is even; it should return False otherwise.

The is_even function should not print anything out or return a number. It should only take in a number and return a boolean.

Note: Be sure to include comments for all functions that you use or create.

For example, if you made a call like

is_even_number = is_even(4)
is_even_number should have the value True.

Once you’ve written this function, write a program that asks the user for integers and prints whether the number they entered is even or odd using your is_even function. You should let the user keep entering numbers until they enter the SENTINEL value.

Here is a sample run of the program:

Enter a number: 5
Odd
Enter a number 42
Even
Enter a number: -6
Even
Enter a number: 0
Done!

(CODEHS, PYTHON)

Answers

def is_even_number(n):

   return True if n % 2 == 0 else False

while True:

   number = int(input("Enter a number: "))

   if number == 0:

       break

   else:

       if is_even_number(number):

           print("Even")

       else:

           print("Odd")

I wrote my code in python 3.8. I hope this helps.

What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?

Answers

Answer:

guys all you have to do is divide and multiply 812x913=741356

and this answer they give you going divide 741356. 1225

so easy guys let me in the comment

Explanation:

Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In which line is the input array given as an argument?

public class SelectionSort{
private static int positionMin (int] vals, int startPosition) {
int minPosition startPosition;
for (int i startPosition; i
if (vals[i] vals[min Position]) {

minPosition = i;
return min

Position; private static void swap(int] vals, int firstPosition, int secondPosition) {

int temp; temp vals[firstPosition];
vals[firstPosition] vals[second Position];
vals[secondPosition] temp return public static void selSort(int| vals) {
int minPos for (int startPos 0; startPos< vals.length; startPos++){

minPos positionMin(vals,startPos); swap(vals,startPos, min Pos) ;

for (int i 0; i< vals.length; i++) { if(i
}else Jelse { System.out.println(vals[i]); } }; }

return; } }

Answers

Answer:

Explanation:

Since there are no line numbers in this question I will start counting from public class SelectionSort{ as line 1 and so on, as well as provide the code on that line.

The index of the smallest value is returned on line 8 where it says return min which shouldn't have any spaces and should be return minPosition;

The input array is given as an argument at the beginning of the function on line 2 where it says private static int positionMin (int] vals, int startPosition) {, as the variable vals.

This input array is also used as an argument on line 10 where it says Position; private static void swap(int] vals, int firstPosition, int secondPosition) and line 15 where it says vals[secondPosition] temp return public static void selSort(int| vals) {

The plugin that changes Jenkins to use green balls instead of blue for successful builds is ________.

Answers

Answer:

The answer is below

Explanation:

Jenkins is a server used by developers to to reliably build, test, and deploy their software. Jenkins has different plugins that can be used for this testing.

Jenkin green ball plugin changes jenkins to use green balls instead of blue for successful builds. This green ball plugin is used as an alternative for blue ball builds and it does not affect the output of the XML and JSON APIs.

If you are the Head of H.R Department in Ali Manufacture Company and you have hire the totally fresh candidates in your company so what kind of training you will suggested; on the job training or off the job training and also justify your answer with four reasons.

Answers

Answer:

on the job training

Explanation:

I would personally suggest on the job training. This is because it provides the new candidates specific experience on how the job will be on a day-to-day basis. This can drastically increase the performance of hired candidates since they will know exactly what and how to perform for that exact company. Also, it will help the candidates get acquainted with the other current employees and even get rid of candidates who would have eventually quit by showing them exactly what the job will be like. Some candidates will realize that the job is not right for them and simply give up and quit.

Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."

Wrtie down some containerization technology.

Answers

Answer:

Some containerization technologies are listed as follows: Docker, Docker Enterprise, Amazon Elastic Container Service, Container Linux, Amazon's AWS, Microsoft's Azure Container, etc.

Explanation:

Containerization technology is a computer technology that packages software codes and their dependencies in isolated user spaces called containers so that the software can run uniformly and consistently on any infrastructure, using a shared operating system.  It is the modern alternative and companion to virtualization.  In simple terms, containerization is the process which packages an application with the required libraries, frameworks, and configuration files so that it can efficiently run in various computing environments.

Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person

Answers

Answer:

Answered below

Explanation:

//Program is written using Java programming language.

Class Person {

private string firstName;

private string lastName;

void set firstName(string a){

firstName = a;

}

string getFirstName(){

return firstName;

}

void setLastname( string b){

lastName = b;

}

string getLastName( ){

return lastName;

}

void displayDetails( ) {

System.out.print(firstName);

System.out.print (lastName);

}

}

//Test program

Class Main{

public static void main(String args [] ){

Person person = new Person( )

person.setFirstName("Karen")

System.out.print(person.getFirstName)

person.displayDetails()

}

}

Write pseudocode for washing a car using at least five steps.

Answers

Answer:

#include <iostream>

int main()

{

bool carWashed{ 0 };

bool washCar{ 0 };

while(carWashed == 0)

{

 washCar();

}

if(washCar == 1)

{

carWashed{ 1 }

}

}

Explanation:

c++

Fix the infinite loop so that it counts from 3 down to 1.public class Loop1{public static void main(String[] args){int x = 3;while (x > 0){System.out.println(x);}}}

Answers

Answer:

Include x-- right after the print statement

Explanation:

Given:

The above lines of code

Required

Edit to countdown from 3 to 1

The above code (as it is) prints 3 in infinite times. To make it countdown to 1, we simply include a decrement operation.

Initially, the value of x is 3: int x = 3;

And the condition is that the loop is to be repeated as long as x > 0

All we need to do is to include x-- right after the print statement.

This  operation will reduce the value of x on every iteration as long as the condition is true.

Hence, the complete code is:

public class Loop1{

   public static void main(String[] args){

       int x = 3;

       while (x > 0){

           System.out.println(x);

          x--;

       }}}

Give an example of an occasion when you used logic to solve a problem

Answers

you can use it when like confirming a policy

The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.

a
Conclusion
b
Introduction
c
Counterclaim
d
Topic Sentence
Question 9 (5 points)

Answers

Answer:

D. Topic Sentence

Explanation:

What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?

Answers

Answer:

Depends. could be an external opticial drive, a scuzi drive, a real to real tape system, or just a simple electromagnetic hard drive with speeds of 1000 rpm or more

Jackie used the software development life cycle to create a new game. Jackie ran her code to make sure it worked and had no errors.

Which stage of the software development life cycle is Jackie currently in?

Coding
Maintenance
Planning & Analysis
Testing

Answers

Answer:

She is running to maintenance to make sure everything works

Answer:

She is testing it.

Explanation:

NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?

display name

alias

relationship

primary key

Answers

Answer:

relationship

Explanation:

Answer:

I agree the should be C)relationship

Explanation:

edg 2021

What is design reference threat

Answers

it’s a threat ‘make it spicey’ so with design

he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do

Answers

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software. It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.

java Elements in a range Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds). For coding simplicity, follow each output integer by a comma, even the last one. The output ends with a newline. Ex: If the input is: 5 25 51 0 200 33 0 50 then the output is: 25,0,33, (the bounds are 0-50, so 51 and 200 are out of range and thus not output). To achieve the above, first read the list of integers into an array.

Answers

Answer:

The program in Java is:

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     int n;

     n = input.nextInt();

     int [] mylist = new int[n+1];

     mylist[0] = n;

     System.out.print("List elements: ");

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

     int min,max;

     System.out.print("Min & Max: ");

     min = input.nextInt();

     max = input.nextInt();

     

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

   }

}

Explanation:

This line declares length of list

     int n;

This line gets length of list

     n = input.nextInt();

This line declares the list/array

     int [] mylist = new int[n+1];

This line initializes the element at index 0 to the length of the list

     mylist[0] = n;

This prompts user for elements of the list/array

     System.out.print("List elements: ");

The following iteration gets list elements

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

This declares the lower and upper bound (min, max)

     int min,max;

This line prompts user for elements of the list/array

     System.out.print("Min & Max: ");

This next two lines get the bound of the list/array

     min = input.nextInt();

     max = input.nextInt();

The following iteration prints the elements in the range

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

What property can we use to check if a string matches a regular expression?


A. match

B. isEqual

C. isSimilar

D. equal

E. matched


I probably won't be able to see the answer in time but I hope this'll help anyone else

Answers

Answer:

A.Match

Explanation:

Plato

The property that can be used to check if a string matches a regular expression is match. The correct option is A.

What is a regular expression?

Simple characters, like /abc/, or a mixture of simple and special characters, like /ab*c/ or /Chapter (d+).d*/, make up a regular expression pattern. Parentheses, which serve as a storage mechanism, are employed in the final illustration.

A string of characters called a regular expression is used to search for patterns. It is primarily used for string matching, pattern matching with strings, etc. They are a general method of matching patterns to character sequences.

The phrase "regular expression" derives from theories in mathematics and computer science and refers to the regularity of mathematical expressions. The earliest grep tools employed text patterns that were regular expressions in a mathematical sense.

Therefore, the correct option is A. match.

To learn more about regular expression, refer to the link:

https://brainly.com/question/17255278

#SPJ5

The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predicate.

Answers

Answer:

1. Where,

2. From

Explanation:

In SQL query language when working on a database, a user can use certain clauses to carry out some functions.

Hence, The WHERE clause allows us to select only those rows in the result relation of the FROM clause that satisfy a specified predicate.

This is because the "Where clause" selects the rows on a particular condition. While the "From clause" gives the relation which involves the operation.

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and frameworks

Answers

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

Identify and give the application of the following operators.

(a) / (b) //​

Answers

Answer:

This answer depends on what language you're using, but in most languages, "//" is used to precede a one-line remark. "/" is used to divide a number by the other.  For example:

// this is a remark

var foo = x / y;

There are exceptions to both, although the / is almost universally used for division.  One exception would be assembly of course, I don't know if there are any higher level languages that don't use the slash.

Test if a password entered is correct. The secret phrase is Ada Lovelace.

Sample Run 1
Enter the Password: Ada Lovelace
Sample Output 1
Correct!
Sample Run 2
Enter the Password: Blaise Pascal
Sample Output 2
Not Correct

for Python

Answers

password = "Ada Lovelace"

if input("Enter the Password: ") == password:

   print("Correct!")

else:

   print("Not Correct")

I wrote my code in python 3.8. I hope this helps.

Other Questions
MARKING BRAINLIEST (PLZ HELP ACTUALLY...)An electrician charges $15.00 per hour for an electrical job that requires morethan 4 hours to complete. For any job requiring 4 hours or less, there is a flatcharge of $50.75. If x represents the number of hours the job requires, writean expression that gives the charge, in dollars, for a job requiring more than 3hours to complete. Please answer asap!!!!!!!!!!!!!!!!!!!!!!!!! I'm also struggling this problem too What is the main function of the smooth and rough Endoplasmic Reticulum in a cell? May I plz get some help plz If you know how, please explain. My brain is splitting in half trying to process this trigonometry stuff What is the purpose of the rhetorical device used iunderlined sentence?The parallel structure emphasizes the idea thatwork is much more challenging than other typesThe parallel structure emphasizes the idea thatcreative process is easily and often interrupted byevents and obligations.The understatement emphasizes the idea that crework is more important than life's everyday obligatThe metaphor emphasizes the idea that the creatiprocess is easily and often interrupted by life's eveand obligations 7th Grade Science Yes i will brain listWhat is a convection current? It is estimated that 26% of the population of Gingerland have red hair. If 10 residents are chosen at random, what is the probability that... (assume each person is independent)a) exactly 4 of them have red hair?b) less than 5 of them have red hair?c) at least one of them has red hair?d) What is the expected (mean) number of people you will find with red hair in this group of 10? Do all plants respond the same to all abiotic factors? Leo has $4,522.08 in his bank account. He deposits another $875.50 and then withdraws $300 in cash. How much is left in his account? Describe the structure of the conjugated proteinhaemoglobin, with reference to the levels of proteinstructure. Gabby plans to make 30 bracelets to sell at the state fair. How long will it take her?Do not include units (hours) in your answer. Mendel discovered that the Yellow color for Peas always showed over the Green color for Peas. He realized that the Yellow genes were stronger and called them what? plzzzz helpp meee No rush just need help The question is Find the constant of proportionality in the graph below Explain how context plays a role in determining whether a writer uses language that is formal or informal. NEED ANSWER ASAP Over the river and through the woods to grandfather's house we go.What Is the Prepositional Phrase? 8. What are NAD+ and FAD? What do they become? Please help 16 points due tomorrow