1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
10

Someone please help! Please fill this out

Computers and Technology
1 answer:
solmaris [256]3 years ago
5 0
A Would be the answer, Sir.!
You might be interested in
Which word processing file that contains text and other
Oksi-84 [34.3K]

Answer:

B . document

Explanation:

Word document contains text, table, picture and more. Word document is a file of .doc, .docx etc format

Table, ribbon or keyboard can't be classed as a file and they are elements of a file, menu or hardware

<u>So correct option is</u> B. Document

7 0
3 years ago
Read 2 more answers
A type of authentication that requires the user to provide something that they know, such
bagirrra123 [75]
The answer would be true
5 0
3 years ago
In an LAN domain, _______________ is similar to a hub but can filter traffic, a ______________ connects LANs, or a LAN and a WAN
Alex17521 [72]

Answer: Switch, router, firewall

Explanation:

The function of the switch is to distribute the network to different networks similar in functioning to that of the hub but it performs filtering of the traffic present in the network using various traffic filtering algorithms.

The router whose main function is to route packets across the network is also used to connect between LANs and between LAN and a WAN.

The firewall is typically installed on systems or in servers or in routers with it most important function to filtering the traffic and minimize the packet delivery delay in LANs.

4 0
3 years ago
You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
DedPeter [7]

ICMPv6 is used by IPv6 nodes to report errors encountered in processing packets, and to perform other internet-layer functions, such as diagnostics.  An Internet Control Message Protocol (ICMP) flood attack, also known as a Ping flood attack, is a common Denial-of-Service (DoS) attack in which an attacker attempts to overwhelm a targeted device with ICMP echo-requests.

Explanation:

Issues that are of concern which could be a problem include :

Denial-of-Service Attacks  

  • ICMPv6 can be used to cause a denial of service (DoS) in a number of  ways, including simply sending excessive numbers of ICMPv6 packets to destinations in the site and sending error messages that disrupt  established communications by causing sessions to be dropped.

Probing

  • A major security consideration is preventing attackers from probing  the site to determine the topology and identify hosts that might be vulnerable to attack.  Carefully crafted but, often, malformed  messages can be used to provoke ICMPv6 responses from hosts thereby  informing attackers of potential targets for future attacks.  However, the very large address space of IPv6 makes probing a less effective weapon as compared with IPv4 . Redirection Attacks

Redirection Attacks

  • A redirection attack could be used by a malicious sender to perform  man-in-the-middle attacks or divert packets either to a malicious  monitor or to cause DoS by blackholing the packets.  These attacks would normally have to be carried out locally on a link using the Redirect message.  Administrators need to decide if the improvement  in efficiency from using Redirect messages is worth the risk of  malicious use.  Factors to consider include the physical security of   the link and the complexity of addressing on the link

Renumbering Attacks

  • Spurious Renumbering messages can lead to the disruption of a site.  Although Renumbering messages are required to be authenticated with  IPsec, so that it is difficult to carry out such attacks in practice,  they should not be allowed through a site boundary firewall.  On the  other hand, a site may employ multiple "layers" of firewalls.

Problems Resulting from ICMPv6 Transparency

  • Because some ICMPv6 error packets need to be passed through a  firewall in both directions, malicious users can potentially use  these messages to communicate between inside and outside, bypassing  administrative inspection.

Packet types or specific circumstances in which ICMPv6 traffic could compromise network security :

Ping sweep — A type of attack that uses ICMP echo request messages to enumerate live hosts on a network.

Ping flood — Utilized to launch a denial of service attack (DoS), where the attacker sends ICMP requests in a rapid succession without waiting for the targeted system to respond.

ICMP tunneling — A method used to establish a covert communication channel between remote systems, most times between a client and a proxy. All communications are sent via ICMP requests and replies

Forged ICMP redirects —  The attacker would send a ICMP redirect message, which informs a host of a direct path to a destination, to the victim that contains the IP addresses of the attacker’s system. This allows an attacker to compromise network traffic via a man-in-the-middle attack or cause a DoS.

8 0
3 years ago
Which cloud computing element that gives a service provider the ability to dynamically allocate shared physical resources to mul
borishaifa [10]

Answer:

Resource Polling is the correct answer to the given question .

Explanation:

The Resource pooling is used in cloud computing frameworks that describe a situation where companies offer temporary and flexible resources to different clients .In the resource polling the programs can be changed to fit the needs of each client without making any adjustments visible to the client.

The main function of resource pooling that it grants a service provider the opportunity to dynamically allocate common physical resources to different clients based on the utilization criteria of each client.

5 0
3 years ago
Other questions:
  • Which of the following is true about the strategy that uses page fault frequency (PFF) to prevent thrashing?
    6·2 answers
  • A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
    5·1 answer
  • Case Project 10-1 As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 empl
    8·1 answer
  • Whenever I go onto Google Chrome, the words are in Spanish! How can I make the words be back in English again? Please let me kno
    7·1 answer
  • What important technology has done the most to allow small businesses a change to compete with larger international companies.
    6·1 answer
  • Daniel has a list of numbers that are not in any order. He wants to find the order of the numbers with the help of a spreadsheet
    10·2 answers
  • How many pieces are there in a normal laptop??? Good luck and solve carefully
    9·1 answer
  • How to turn on a computer
    9·1 answer
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • (blank) is an expansion card that enables a computer to connect to a network:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!