1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eduard
3 years ago
15

The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.

Computers and Technology
1 answer:
Anna35 [415]3 years ago
7 0

Answer:A teardrop attack

Explanation:

A teardrop attack also  called  denial-of-service  attack is one  which an attacker, usually a hacker  sends many  fragmented bug data messages  to a victim's machine causing a crash in the device. This is because data moves in small data packets of whose transmission should follow layers according to the model of the devise be it OSI or  TCP/IP model. Now when a hacker continually sends huge amounts of packets of bug data, the process of data transmission fails and  packet data becomes overlapped, making the victim 's device machine in disarray and difficult to reconstruct while trying to  rearrange them. When the hacker continually sends in more bug data packets to the already confused machine,  The machine system crashes.

You might be interested in
QUESTION 3 / 10
Deffense [45]
A.keeping track of how much you have spent is simple
6 0
3 years ago
You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an
lesya692 [45]

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

3 0
4 years ago
Does Rational database software lets you link multiple tables? Yes or no
Julli [10]

Answer:

yes

Explanation:

i did some research but don't take my word for it and let me know if it wrong

4 0
2 years ago
Identify way computer are used in television production​
Aleonysh [2.5K]

Answer:

image editing, text om screen, weather graphics, animation, sattelites ... a lot more possibilites are endless just limited

3 0
3 years ago
The advantage of _________ is that it provides extremely high data availability.
Slav-nsk [51]

The advantage of RAID is that it provides extremely high data availability.

<h3>What are RAID and its advantages?</h3>

Redundant Array of Independent Disks, or RAID, is a technology that combines several hard disks to increase performance. RAID can boost your computer's speed while providing you with a single drive with a sizable capacity, depending on how it is set up. Additionally, RAIDs might boost dependability.

Increased cost-effectiveness due to the widespread use of disks at cheaper prices. RAID enhances the performance of a single hard drive by utilizing numerous hard drives. Depending on the setup, increased computer speed and dependability after a crash.

Redundant Array of Inexpensive Disks, or RAID, is an acronym. If used literally, it refers to storing data on a number of relatively inexpensive hard disk drives (HDDs). Generally speaking, it is referred to as "Technology that merges a number of such cheap HDDs into a single HDD."

To learn more about the advantage of RAID refers to:

brainly.com/question/13112038

#SPJ4

6 0
1 year ago
Other questions:
  • ASAP
    12·2 answers
  • Given the list my_list containing integers, create a list consisting of all the even elements of my_list. Associate the new list
    12·1 answer
  • Write a compound inequality that is represented by the graph.
    14·1 answer
  • In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
    8·1 answer
  • Would 2 bits be enough to create a special code for each english vowel
    12·1 answer
  • A domain name is used to: *
    15·1 answer
  • Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user h
    5·1 answer
  • What is the best use of network in homes
    15·2 answers
  • Write a function called printRange() that accepts two integers as arguments and prints the sequence of numbers between the two a
    10·1 answer
  • If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!