1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
12

Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?

Computers and Technology
2 answers:
liq [111]3 years ago
6 0
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
Harman [31]3 years ago
4 0
If im not mistaken its DoS because it gives a fake up address and it can't be traced which is why your able to hack software's without the person knowing
You might be interested in
Anyone watch anime, i love stay kids and they sang the op for Tower of God XD
TEA [102]

Answer:

I do Stray kids and Tower Of God is good combo mannnn

6 0
3 years ago
Read 2 more answers
The format that you will use on your works cited page when the entry is longer than one line is__________.
OverLord2011 [107]

The format that you will use on your works cited page when the entry is longer than one line is to second and all subsequent lines need to be indented half an inch.

<h3>What kind of formatting is used on a works cited page?</h3>

In the formatting of the Works on Cited page, the layout is that "Title the page Works Cited, do put it on the center and in plain text (no italics, bold, or underline). etc.

Note that the format to use when  your works cited page  entry is more than one line is to second and all subsequent lines need to be indented half an inch.

Learn more about cited page from

brainly.com/question/1382377

4 0
2 years ago
A = 250; B = 325. which of the following statements is true? A ==B A&gt;B A =B
Feliz [49]

Answer:

It should be A<B

Explanation:

250 is less than 325

5 0
2 years ago
2. A host computer with an IP address of 172.16.29.155 using a subnet mask of 255.255.255.0 and a gateway of 172.16.29.1 pings a
ASHA 777 [7]

Answer:

From the host IP address and subnet mask, you can tell that both computers are on the same network. Host 172.16.29.155 will need to send an ARP request broadcast for 172.16.29.83 to get the MAC address and update its ARP table if the host 172.16.29.83 has not already done so.

Explanation:

<h2>ADDRESS RESOLUTION PROTOCOL (ARP)</h2>

Address Resolution Protocol (ARP) is a procedure for mapping a logical address known as the IP address to a physical address known as MAC (Media Access Control) address in a local area network. The job of the ARP is essentially to translate 32-bit addresses to 48-bit addresses and vice-versa when using IP Version 4 (IPv4) to communicate on the network.

Most of the computer programs/applications use logical address (IP address) to send/receive messages, however, the actual communication happens over the physical address (MAC address) this happens in the layer 2 of the OSI model. An ARP request is a broadcast, and an ARP response is a Unicast.

Scenarios when ARP is used:

Scenario-1: The sender is a host and wants to send a packet to another host on the same network.

·        Use ARP to find another host’s physical address

Scenario -2: The sender is a host and wants to send a packet to another host on another network.

·        Sender looks at its routing table.

·        Find the IP address of the next-hop (router) for this destination.

·        Use ARP to find the router’s physical address

Scenario -3: the sender is a router and received a datagram destined for a host on another network.

·        Router checks its routing table.

·        Find the IP address of the next router.

·        Use ARP to find the next router’s physical address.

Scenario -4: The sender is a router that has received a datagram destined for a host in the same network.

·        Use ARP to find this host’s physical address.

The situation in the question above falls under scenario-1. From the host IP address and subnet mask, you can tell that both computers are on the same network. Host 172.16.29.155 will need to send an ARP request broadcast for 172.16.29.83 so to get the MAC address and update its ARP table if the host 172.16.29.83 has not already done so.

7 0
3 years ago
Cuál es la diferencia entre hackeo y crackeo
Sauron [17]

Answer: El hackeo es el proceso de intrusión en los sistemas informáticos sin autorización para acceder a ellos, con buenos o malos propósitos, el cracking es la misma práctica aunque con intención delictiva.

3 0
2 years ago
Other questions:
  • Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
    6·1 answer
  • Given a computer running four types of instuctions, named classes A through D, calculate the execution time of a program that ha
    5·1 answer
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number w
    8·1 answer
  • What statement best decribes the relashionship bewteen science and technoligy?
    11·2 answers
  • As the network engineer, you are asked to design an IP subnet plan that calls for three subnets. The largest subnet needs a mini
    14·1 answer
  • What unit is used to describe the smallest amount of bitcoin?
    13·1 answer
  • Write a program that prints the sum of the even numbers and the products of odd numbers on the screen
    10·1 answer
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • Write an alogorithm and draw the Flow Chart to
    5·1 answer
  • A diagram of a ten-node network that uses ten routers
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!