1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
12

Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?

Computers and Technology
2 answers:
liq [111]3 years ago
6 0
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
Harman [31]3 years ago
4 0
If im not mistaken its DoS because it gives a fake up address and it can't be traced which is why your able to hack software's without the person knowing
You might be interested in
_____ is when a person connects their location to photos that are posted online.
Margaret [11]
B) friend tagging is when
4 0
3 years ago
Read 2 more answers
Calling all technology geeks— whenever I try to take a video; the video becomes muted and the sound button looks like this. Does
Diano4ka-milaya [45]

Answer: Just press on it or sum ig.

Explanation:

3 0
3 years ago
When an interviewer asks “Tell me about yourself”, you should tell them about your childhood past.
Butoxors [25]

Answer: Nooo! Dont!

Explanation:That is a bad idea!

4 0
3 years ago
Read 2 more answers
If you insert a picture, resize and reposition it, and then change to a different picture, you must modify the new picture to
Mashcka [7]

Answer:

false , that is not true

Explanation:

because a person can change to a different picture , but it Is not by force it will have a match to the original

3 0
2 years ago
Read 2 more answers
Universal Containers has a custom picklist filed with three values on their products. The Admin would like to create a Dynamic B
Agata [3.3K]

Answer:

The Admin should Create a rule with three conditions, each that compares the configuration attribute filed with a static value.

8 0
3 years ago
Other questions:
  • Create a class ProblemSolution with following characteristics Two private member variables name & designation of string type
    8·1 answer
  • You want to create a directory called ~/Documents/papers, but you’re not sure that the ~/Documents directory exists. What comman
    15·1 answer
  • How do media and networks interact? A. Networks and media work in exactly the same way. B. Media are connected to networks that
    8·1 answer
  • 54 points!!! Cyber security
    14·1 answer
  • Someone please make a random question with an easy answer because i need one more brainliest to UPGRADE!
    7·2 answers
  • 100POINTS!!!!!!!!!!!!!!!!!!!I WILL ANSWER ALL OF YOUR QUESTIONS PLEASE LOVES:)))Upload your completed project including the foll
    12·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart?
    7·2 answers
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • Information about www
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!