1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neko [114]
2 years ago
15

A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.

Computers and Technology
1 answer:
PSYCHO15rus [73]2 years ago
4 0

Answer:

DDos or Distributed Denial Of Service Attack

Explanation:

:)

You might be interested in
____ is necessary in any computer system because some resources such as memory, cpu, and dedicated devices must be exclusively a
bija089 [108]
The answer is the os or the operating sysetm because without it the computer can't even start up and run correctly

5 0
4 years ago
An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
prisoha [69]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

The following facts underneath will avoid this form of attack:

  • Implement a VLAN to distinguish HVAC from a free wireless channel or network.
  • To secure the HVAC device mount IDS.
  • Let NAC on either the wireless system and network available.
  • Activate WPA2 sec on the mobile phone network.
4 0
3 years ago
Which of the following is true about speculative risks? a. The risk/return tradeoff is applicable to speculative risks. b. Specu
My name is Ann [436]

Answer:

A) The risk/return Tradeoff is applicable to speculative risks.

Explanation:

Speculative risk always has a positive payoff and also a negative payoff , so option (b) is incorrect.

Speculative risk is a source of great concern for risk managers, so option (c)is incorrect.

Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss , so option d is wrong

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss. Pure risk includes such incidents as natural disasters, fire or untimely death. so option (e) also incorrect

7 0
3 years ago
If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped co
Alona [7]

Answer should probably be B. I don’t think you’d need an application to transfer data, and the computer wouldn’t even tell you if the data couldn’t transfer if you have the wrong cable head. It wouldn’t even be connected.

6 0
3 years ago
Drag each tile to the correct box.
saw5 [17]

ISDN – improvement over dial-up; DSL – uses a higher frequency than a voice call; dial-up – makes your phone-line busy; cable internet – uses coaxial television cables; mobile internet – uses the cellular network are the different types of internet connection.

<h3>What is an internet connection?</h3>

The technology and systems of connectivity that allow a user to get access to the internet is known as an internet connection. There are different types of internet connection based on their technologies.

Hence, the different types of internet connection with their functionalities are mentioned above.

Learn more about internet connection here:

brainly.com/question/9380870

#SPJ1

7 0
3 years ago
Other questions:
  • Select all that apply. Given the following code fragment, which of the things shown below happen when the statement on line 8 ex
    13·1 answer
  • Which virus-infecting components are email messages prone to carry?
    8·2 answers
  • Can someone explain to me how to do circuit calculations
    11·1 answer
  • Write a loop to print 10 to 90 inclusive (this means it should include both the
    10·1 answer
  • The entress Effie cooks as a chef never vary by taste, quantity or quality
    6·1 answer
  • *explain why computer literacy is vital to access in today’s business work
    11·1 answer
  • List 5 object which are considered part of ICT. explain its function.
    10·1 answer
  • Find the ratio of 24 to 36​
    5·2 answers
  • Please help me i’ll give you brainlist
    13·1 answer
  • What is the difference between concrete language and abstract language? give an example of each.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!