1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
5

A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, re

sulting in valid requests being ignored. What type of attack occurred?
Computers and Technology
1 answer:
stellarik [79]3 years ago
8 0

Answer:

SYN flooding

Explanation:

The options are:

  • Trojan horse
  • brute force
  • ping of death
  • SYN flooding

This is certainly a denial of service attack. And the Syn flooding is a kind of such attack in which the attacker transmits a series of SYN requests to the target for consuming enough server resources cuch that the system becomes unresponsive to the legitimate traffic. And hence, the correct option out here is the SYN flooding.

You might be interested in
If an engine has four cylinders and a total of 16 valves, how many valves would each cylinder have?
wel
4 because 4 x 4=16. Easy. I like to think of it as multiplication.
4 0
3 years ago
What is the practice of distributing responsibility among multiple people so that no one person has full control of
Sholpan [36]

Answer:

If the responsibilities are distributed ,the disputes amongst people wont take place because their wont be any partiality, everyone would be equal. Moreover it is difficult for one person to control everything at once and multiple people would help the work to be organized as everyone will have their own part of work which is supposed to be fulfilled.

8 0
2 years ago
100 POINTS FOR ANYONE WHO CAN DO THIS!
Nataly [62]

Let's check what can be modified

Before calling def we need adjective and conjunctions stored inside variables

Store them(You may change according to your choice)

\tt adjectives=("foolish","bad","long","hard")

\tt conjunctions=("and","but","for","after")

We have to make optional ,easy way ask the user to do instead of yourself .

\tt con=input("Enter\: yes\: if \:you \:want \:to \:use \:conjunctions:")

\tt adj=input("Enter\:yes\:if\:you\:want\:to\:use\: adjectives:")

If they click then we can proceed else no problem let the program run

\tt def\: conjunctionPhrase():

\quad\tt if\: con=="yes":

\quad\quad\tt return\:random.choice(conjunctions)+"\:"+nounPhrase()

\quad\tt else:

\quad\quad\tt continue

  • You may use pass also

\tt def\: adjectivePhrase():

\quad\tt if\:adj=="yes":

\quad\quad\tt return\:random.choice(adjectives)+"\:"+nounPhrase()

\quad\tt else:

\quad\quad\tt continue

4 0
2 years ago
File "f2" has a size of 2. Why? A. It contains the string "f1". B. It contains two blank lines.
Aneli [31]

Answer:

A. It contains the string "f1"

7 0
3 years ago
What are computer engineering algorithms?
Tom [10]
An algorithm<span> is a well-defined procedure that allows a </span>computer<span> to solve a problem. Another way to describe an </span>algorithm<span> is a sequence of unambiguous instructions. ... In fact, it is difficult to think of a task performed by your </span>computer<span> that does not use</span>algorithms<span>.</span>
5 0
3 years ago
Other questions:
  • You can use Facebook's live feed tool to broadcast content as you post it
    8·2 answers
  • When creating a professional presentation, how many typefaces are recommended at the most?
    5·1 answer
  • Students are studying the effects of beach pollution by counting populations of seagulls at two different beach locations. One l
    7·1 answer
  • Out of the following, find those identifiers, which cannot be used for naming Variables, Constants or Functions in a python prog
    11·1 answer
  • If I had to choose the class I prefer it would be a
    10·1 answer
  • Self-confidence, blank, and communication are key factors to building positive relationships. Fill in the blank with a 13 letter
    5·1 answer
  • What is a common use for append queries?
    14·2 answers
  • The most widely used computer device​
    6·2 answers
  • What is the first step in finding a solution to a problem?
    9·2 answers
  • Which description best applies to a macro?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!