1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
5

A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, re

sulting in valid requests being ignored. What type of attack occurred?
Computers and Technology
1 answer:
stellarik [79]3 years ago
8 0

Answer:

SYN flooding

Explanation:

The options are:

  • Trojan horse
  • brute force
  • ping of death
  • SYN flooding

This is certainly a denial of service attack. And the Syn flooding is a kind of such attack in which the attacker transmits a series of SYN requests to the target for consuming enough server resources cuch that the system becomes unresponsive to the legitimate traffic. And hence, the correct option out here is the SYN flooding.

You might be interested in
What is software?
bogdanovich [222]

Answer:

B

Explanation:

3 0
3 years ago
Read 2 more answers
Which type of partitioning is performed onRelation-X?
goldenfox [79]

Answer: B) Vertical Partitioning

Explanation:

As, vertical partitioning is performed on Relation X, it is used for dividing the relation X vertically in columns and it involves creation of tables and columns. They also use some additional tables to store left out columns. We cannot partition the column without perform any modification of value of the column. It only relies on keeping the particular attributes of relation X.

7 0
3 years ago
What do computers use to represent on and off? 0 and 1 1 and 2 RGB Megabyte
rosijanka [135]
We use 0 to represent "off" and 1 to represent "on". Each one of the switches is a bit. A computer is called a "64-bit" computer if its registers are 64-bits long (loosely speaking). Eight switches in a row is a byte.
7 0
2 years ago
Please Answer these following Question very urgent "file attch"
Tanya [424]

Answer:

1. ∑ numbers=57

Overall ∑ is 57 hence.

And each number is less than 15, and hence they can be represented in 4 bits

However, we cannot write 57 in 4 bits.

However, 111001 is 57 in binary, and it is as well greater than 4 bits.

Hence, we are adding the two extreme left bits to right 4 bits as mentioned below.

Left are 11, right bits are 1001

1001

   11

1110 is the checksum

=14 and this is 14 bits.

2. The degree of given polynomial is 3, and hence,

The divisor is X3+1 =1001

Original data word=10110

Since the size of CRC is 3 bits, we should place 3 zeros to the right of the original data

And thus we get,  

10110000

         10100

1001√10110000

         1001

         00100000

         1001

         --------------

         0100   CRC

We send our data 10110 its reminder (CRC) will be added with it like 10110100

Receiver will receive 10110100 with same divisor 1001

         10100

1001√10110100

         1001

---------------------------

         01001

           1001

--------------------------------

           000

And since the last 3 bits are zero, and hence its error free.

3.

At 7 and 5 we have 1 and similarly in 2nd at 8, 4 and 0

  Bits    Polynomial

1010000        X7+X5+0

10001001 X8+X4+1

Explanation:

Please check answer.

3 0
3 years ago
Who primarily determines the value of a technology over time?
Novosadov [1.4K]

Answer:

a

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • It is used to replace numeric number of a website​
    7·1 answer
  • : How does the founder of Wikipedia keep a tight reign on accuracy? HELP PLEZ AT LEAST A PARGRAPH PLES
    6·1 answer
  • How do i switch my level to high school on brainly
    10·2 answers
  • WRITE A JAVA PROGRAM TO PRINT THE PATTERN<br> 13579<br> 2468<br> 357<br> 46<br> 5
    12·1 answer
  • Window frame will expand to fill the entire desktop when you
    12·1 answer
  • Which of the following statements accurately describes linked data?
    5·1 answer
  • In this assignment we are going to practice reading from a file and writing the results of your program into a file. We are goin
    10·1 answer
  • Fre.....ee p......oint....s
    15·2 answers
  • Why are people's visions of utopias and dystopias subjective?
    9·1 answer
  • A computer has dose not have ___________
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!