1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
expeople1 [14]
4 years ago
10

The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the v

ictim may be tricked into sending messages to and from itself is a(n) _______________ attack. A. Teardrop B. Land C. myDoom D. echo-chargen
Computers and Technology
1 answer:
Sergeeva-Olga [200]4 years ago
7 0

Answer:

TEARDROP

Explanation:

Teardrop is a form of attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself .

Teardrop attack also involves sending fragmented packets to a target machine in which the victim is been tricked into sending messages to and from itself. One of the fields in an IP header is the “fragment offset” field, indicating the starting position of the data contained in a fragmented packet relative to the data in the original packet.

You might be interested in
Madison works for Google as an Ethical Hacker. Madison main job responsibility is
Ivenika [448]

Answer:

to evaluate the security and identify vulnerabilities of a business

Explanation:

Madison is an ethical hacker (white hat hacker), meaning she is hired by companies to make sure that "evil" hackers (black hat hackers) can't hack into their websites.

7 0
3 years ago
Read 2 more answers
What are examples of object types that can be viewed in the Navigation pane? Check all that :
TiliK225 [7]

Answer:

2.) Forms

4.) Queries

6.) Tables

Explanation:

8 0
3 years ago
Match the IP Protections Patent, Copyright and Trademark into the following cases:
Vesna [10]

Answer:

A) copyright

B) copyright

C)Trade mark

D) copyright

E)Patent

Explanation:

Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.

trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.

Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.

Below is the match of the intellectual property with the examples.

a. books, poems<> Copyright

b. music, movies, paintings<> Copyright

c. company logo<> Trademark

d. software<>Copyright

e. combinations of materials to make drugs<> patent

8 0
3 years ago
Complete a flowchart and a Python program to calculate grade of a student based on marks using the following criteria:
erik [133]

Answer:

grade = int(input("Enter grade: ")

if grade > 90:

   print("A*")

elif grade > 80 and grade < 90:

   print("A")

elif grade > 70 and grade < 80:

   print("B")

elif grade > 60 and grade < 70:

   print("C")

elif grade > 40 and grade < 50:

   print("E")

else:

   print("Fail")

Explanation:

8 0
3 years ago
Duolcgnitupmoc unscramble the word​
ahrayia [7]

Answer:

The word is computing cloud, since the topic is from computers and technology, and the whole word is backwards.

6 0
3 years ago
Read 2 more answers
Other questions:
  • What is a good monitor for console gaming? (Any price)
    13·2 answers
  • Which feature is a component of a database application?
    7·1 answer
  • When parallel sections of oxygen and fuel gas hoses are taped together, only _____ inches out of 12 inches should be covered by
    8·2 answers
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • To prevent users of the application from changing the size of the form. you must set the FormBorderStyle property to ____
    6·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless servi
    7·1 answer
  • Combining data and code in a single object is known as
    7·1 answer
  • Which statement best describes the computers all around us?
    15·1 answer
  • Characteristics of partial copy sandboxes versus full sandboxes? choose 2 answers
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!