1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
2 years ago
9

Greg is concerned about the use of ddos attack tools against his organization, so he purchased a mitigation service from his isp

. what portion of the threat model did greg reduce?
Computers and Technology
1 answer:
choli [55]2 years ago
3 0

The threat model implied by Greg to reduce the DDoS attack by buying mitigation service reduces the impact. Thus, option C is correct.

<h3>What is DDoS attack?</h3>

DDoS attack has been an acronym to distributed denial-of-service attack. It is a type of cybercrime that forms the development of the internet traffic over a server, and the overloading forms the user to be enable to access the site operations.

The mitigation service enables the legitimate traffic to reach the server with forming the filter to the server traffic. The buying of service by Greg reduces the impact of the attack. Thus, option C is correct.

Learn more about DDoS attack, here:

brainly.com/question/14052714

#SPJ4

Your question seems to be incomplete, the missing options to the question are:

A. Likelihood

B. Total attack surface

C. Impact

D. Adversary capability

You might be interested in
Which of the following option is not available in Insert&gt;&gt;Picture?
zysi [14]

Answer:

Word art

Explanation:

its copy and paste

7 0
3 years ago
Read 2 more answers
In three to five sentences, explain the function of the computer's operating system.
Sati [7]

Answer:

An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Explanation:

3 0
3 years ago
2 The software needed to send an email is:
Alexxx [7]

Answer:

C communication software

Explanation:

C communication software IS THE ANSWER

8 0
3 years ago
Create a float variable named circumference.
Likurg_2 [28]

Answer:

Float circumference; // Create a float variable

Explanation:

The float datatype is used for storing the decimal point values .The syntax  to declaring  any float variable is given below.

float variable-name;

float  circumference; // create a float variable

circumference=89.9007;; // store the value in circumference

Following are program in c++

#include <iostream> // header file

using namespace std; //namespace

int main() // main function

{

   float circumference; // creating variable float

   circumference=89.9007; // storing value

   cout<<circumference;  // display value circumference

   return 0;

}

Output:

89.9007

5 0
3 years ago
You plan to use the Fill Down feature on a formula and you need to keep a cell reference the same. Which one of the following fo
viva [34]
You have to use this format for example $A$2
The format for absolute reference is designated with a dollar sign ($). If both column and, put a dollar sign before and in between the row and column. By doing this, column and row do not change when copied.
3 0
3 years ago
Other questions:
  • A search engine that crawls uses
    7·1 answer
  • Web-based application software is software that ________.
    13·1 answer
  • According to the video, what education and experience do employers look for in Reporters and Correspondents? Check all that appl
    10·2 answers
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • Write a Python program to convert the characters to lowercase in a string
    6·1 answer
  • Which of the following shows a list of Big-Oh running times in order from slowest to fastest?
    7·2 answers
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • I need help 50 points and brainless if you answer
    7·1 answer
  • What is a good range for CPU usage to be considered running well?
    15·1 answer
  • PLS HELP MEE it's due in 2 minutes​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!