menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, ftp site, or person in a chat sess…
Ask a Question
Questions
Unanswered
Tags
Ask a Question
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, ftp site, or person in a chat sess…
asked
Nov 10, 2018
71.6k
views
1
vote
When an attacker presents a program or himself as someone else to obtain private information and pretends to be a legitimate website, network, ftp site, or person in a chat session, what type of attack is occurring?
Computers & Tech
high-school
Framp
asked
by
Framp
7.6k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
4
votes
A spoofing attack. "
a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage."
Ryan Norbauer
answered
Nov 16, 2018
by
Ryan Norbauer
8.3k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Jul 26, 2018
205k
views
When do you use FTP? A.to transfer files online B.to chat online C.to send email D.to browse websites
Corey Ross
asked
Jul 26, 2018
by
Corey Ross
8.1k
points
Computers & Tech
middle-school
2
answers
4
votes
205k
views
asked
Feb 20, 2024
191k
views
A ________ pretends to be a legitimate company and sends emails requesting confidential data. A) hacker B) phisher C) wardriver D) sniffer
Karuto
asked
Feb 20, 2024
by
Karuto
9.3k
points
Computers & Tech
high-school
1
answer
1
vote
191k
views
asked
Jun 27, 2020
86.8k
views
____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest.
Styts
asked
Jun 27, 2020
by
Styts
8.4k
points
Computers & Tech
high-school
1
answer
2
votes
86.8k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
Seven basic internal components found in a computer tower
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty