1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
1 year ago
9

Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp

. what portion of the threat model did greg reduce?
Computers and Technology
1 answer:
choli [55]1 year ago
3 0

The threat model implied by Greg to reduce the DDoS attack by buying mitigation service reduces the impact. Thus, option C is correct.

<h3>What is DDoS attack?</h3>

DDoS attack has been an acronym to distributed denial-of-service attack. It is a type of cybercrime that forms the development of the internet traffic over a server, and the overloading forms the user to be enable to access the site operations.

The mitigation service enables the legitimate traffic to reach the server with forming the filter to the server traffic. The buying of service by Greg reduces the impact of the attack. Thus, option C is correct.

Learn more about DDoS attack, here:

brainly.com/question/14052714

#SPJ4

Your question seems to be incomplete, the missing options to the question are:

A. Likelihood

B. Total attack surface

C. Impact

D. Adversary capability

You might be interested in
In this exercise, you will write a class that represents how you spend your time during the week The class should have four doub
Nuetrik [128]

Answer:

Answered below

Explanation:

# Program is written in Java

class WeekHours{

double school;

double fun;

double sleep;

double sports;

WeekHours( ){

school = 0.0;

fun = 0.0;

sleep = 0.0;

sports = 0.0;

}

public void setSchool ( double x){

school = x;

}

public void setFun( double y){

fun = y;

}

public void setSleep( double w){

sleep = w;

}

public void setSports( double z){

sports = z;

}

public void totalHours(){

double tHours = school + fun + sleep + sports;

System.out.print(tHours);

}

}

4 0
3 years ago
You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?
Norma-Jean [14]

Answer:

boolean search

Explanation:

4 0
3 years ago
Read 2 more answers
How do you get a free ps4
KatRina [158]

Answer:

By having very good luck and winning it in a giveaway!!!

4 0
3 years ago
Read 2 more answers
The most important form of nonverbal communication during a presentation is PowerPoint.
denis-greek [22]
It could also be eye contact
6 0
3 years ago
Find meanings for the words and give examples where you can<br><br> WORTH 30 points
NARA [144]
Vector: A one dimensional array. A 1 inch arrow pointing at a 30° angle.
Bitmap: Image file format. An image displayed on a computer monitor.
Image file types: JPEG, GIF, PDF.
Variables: A value that can change based on information in the program. null, int, char.
Program sequencing: Running code in order, from top to bottom.
Program integration: Combining parts of software into one system.
HTML: Programming language, short for Hypertext Markup Language. You can create paragraphs with HTML.
Good web design: A website that is easy to use, pleasing to look at, and suits the brand of the website accordingly.
3 0
3 years ago
Other questions:
  • What are the 6 external parts of a computer
    14·1 answer
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • The process of starting or restarting a computer or mobile device is called __________.
    5·1 answer
  • If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? Wha
    10·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • Compare and contrast CD and DVD?
    10·2 answers
  • When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
    5·1 answer
  • What is the maximum current that should be allowed in a 5.0w 220 resistor?
    12·1 answer
  • The code to perform a binary search is below. Match the variable name with what it holds.
    12·1 answer
  • Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!