1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
2 years ago
11

You are the security analyst for your organization and have discovered evidence that someone is attempting to brute-force the ro

ot password on the web server. Which classification of attack type is this
Computers and Technology
1 answer:
cluponka [151]2 years ago
3 0

This type of attack can be classified as an active attack.

<h3>The classification of attacks.</h3>

In Cybersecurity, there are four (4) main types of attacks and these include the following:

  • External
  • Passive
  • Inside
  • Active

In this scenario, the type of attack being experienced by the security analyst is an active attack because it was discovered that someone attempted to brute-force the root password on the web server.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

You might be interested in
As a compositional mode for electronic? media, __________ help people find their way through an unfamiliar system or? subject; t
maks197457 [2]
The answer that fills in the blank is orientation. It is because orientation does not provide all the details of what they are doing but a guideline of what they must do, in order for them to be guided on the things that they need to learn as they start. They require proper guidance which is the orientation before performing before hand. Especially when they are not familiar on what they need to do.
3 0
3 years ago
1,2,3,4,5,6,7,8,9,10 – Best case - Sorted in ascending order
Pepsi [2]

Using the knowledge in computational language in python it is possible to write a code that from a random number draw creates an order of increasing numbers

<h3>Writting the code in python:</h3>

<em>def shellSort(array, n):</em>

<em>    # Rearrange elements at each n/2, n/4, n/8, ... intervals</em>

<em>    interval = n // 2</em>

<em>    while interval > 0:</em>

<em>        for i in range(interval, n):</em>

<em>            temp = array[i]</em>

<em>            j = i</em>

<em>            while j >= interval and array[j - interval] > temp:</em>

<em>                array[j] = array[j - interval]</em>

<em>                j -= interval</em>

<em>            array[j] = temp</em>

<em>        interval //= 2</em>

<em>data = [10,9,8,7,6,5,4,3,2,1]</em>

<em>size = len(data)</em>

<em>shellSort(data, size)</em>

<em>print('Sorted Array in Ascending Order:')</em>

<em>print(data)</em>

See more about python at brainly.com/question/18502436

#SPJ1

5 0
2 years ago
The list below represents the contents of a computer's main memory. I've left every other byte blank. Assume that the letters at
inysia [295]

Answer:

3) A Single linked list is a sequence of elements in which every element has link to its next element in the sequence.

DATA LINK

DATA stores actual value , LINK stores address of next node

As per information given in question, letters at the even addresses are items in linked list and the odd addresses will be used as links.

Even Address Odd Address

12 (Stores 't') 13 (Used as link)

14 (Stores 'm') 15 (Used as link)

16 (Stores 'a') 17 (Used as link)

18 (Stores 'r') 19 (Used as link)

20 (Stores 's') 21 (Used as link)

Numbers represented by circle are addresses of respective nodes. Here Front or Head has address 16. Which represents the Head Node.

Following image represents the word "smart" with respective nodes and their addressing.

​

Numbers represented by circle are addresses of respective nodes.

The head pointer is: 20

7 0
3 years ago
At which layer of the osi model is the entire message referred to as the payload
erik [133]

I guess the correct answer is application

An applicatiοn layеr is an abstractiοn layеr that spеcifiеs thе sharеd cοmmunicatiοns prοtοcοls and intеrfacе mеthοds usеd by hοsts in a cοmmunicatiοns nеtwοrk. Thе applicatiοn layеr abstractiοn is usеd in bοth οf thе standard mοdеls οf cοmputеr nеtwοrking: thе Intеrnеt Prοtοcοl Suitе (TCP/IP) and thе ΟSI mοdеl. Althοugh bοth mοdеls usе thе samе tеrm fοr thеir rеspеctivе highеst lеvеl layеr, thе dеtailеd dеfinitiοns and purpοsеs arе diffеrеnt.

6 0
3 years ago
Write a method called removeInRange that accepts four parameters: an ArrayList of integers, an element value, a starting index,
Murrr4er [49]

Answer:

public static void removeInRange(List<Integer> list, int value, int start, int end) {

       for (int i = end - 1; i >= start; i--) {

           if (list.get(i) == value) {

               list.remove(i);

           }

       }

       System.out.println(list);

   }

Explanation:

- Create a method named <em>removeInRange</em> that takes four parameters, a list, an integer number, a starting index and an ending index

- Inside the method, initialize a <u>for loop</u> that iterates between starting index and ending index

- If any number between these ranges is equal to the given <em>value</em>, then remove that value from the list, using <u>remove</u> method

- When the loop is done, print the new list

7 0
3 years ago
Other questions:
  • Daniel makes changes to a workbook named “Results.” He saves the file as “New Results” but did not realize that a worksheet name
    10·1 answer
  • Given a positive real number, print its fractional part.
    14·1 answer
  • Project Description The Department plans to purchase a humanoid robot. The Chairman would like us to write a program to show a g
    15·1 answer
  • How to upgrade from office home to office professional
    13·1 answer
  • In which of the following scenarios would it be best to use a for loop?
    6·1 answer
  • Murray is a database technician. He has created a single enterprise database system. How is this better than multiple databases
    15·1 answer
  • What is the difference between player-centric game design and designer-centric game design? How does a player-centric game assis
    7·1 answer
  • Given a number count the total number of digits in a number
    12·1 answer
  • Win10如何删除自己添加的环境变量?...............
    8·1 answer
  • 9.19 LAB: Words in a range (lists) Write a program that first reads in the name of an input file, followed by two strings repres
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!