1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
5

A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, re

sulting in valid requests being ignored. What type of attack occurred?
Computers and Technology
1 answer:
stellarik [79]3 years ago
8 0

Answer:

SYN flooding

Explanation:

The options are:

  • Trojan horse
  • brute force
  • ping of death
  • SYN flooding

This is certainly a denial of service attack. And the Syn flooding is a kind of such attack in which the attacker transmits a series of SYN requests to the target for consuming enough server resources cuch that the system becomes unresponsive to the legitimate traffic. And hence, the correct option out here is the SYN flooding.

You might be interested in
Complete the concept map on computer as outlined below​
USPshnik [31]

Answer:

Here is your answer.

have a great day

6 0
3 years ago
When you create names for the elements of a webpage (such as ), what are some rules that you can follow to make your HTML code e
shusha [124]

Answer:

by using proper indentation

Explanation:

6 0
3 years ago
Read 2 more answers
How can these requirements be met? Universal Containers conduct evaluations of their sales reps using a custom object consisting
Rudik [331]

Answer:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security

Explanation:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security.

The reason the answer is B is because if access is provided through a hierarchy, it will give access to all the users at the higher manager role for the records of every executive. Also the options provided do not state clearly if Grant access using hierarchy is also checked so we cant assume that.

4 0
4 years ago
Zola is very skilled with Microsoft and Apple, and she knows different methods of programming. This knowledge will help make Zol
hammer [34]
I believe programmer would be your answer! If there is a multiple choice, please tell me in the comments of this answer!
3 0
3 years ago
Read 2 more answers
The envelope method, notebook and pencil, and online software are all methods of ______.
coldgirl [10]

Answer:

communication

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • You press the power button in order to start your computer but hear nothing and see nothing. Name 2 possible reasons for this.
    6·1 answer
  • The software used to help run the computer hardware is the _____.
    9·2 answers
  • Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
    11·1 answer
  • After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people
    7·2 answers
  • Write a function called count_occurrences that takes two strings. The second string should only be one character long. The funct
    13·1 answer
  • Explain in details how Galen , a physician during the Middle Ages, expanded on Hippocrates' theory of the four humors and explai
    6·1 answer
  • Working mechanism of computer ​
    10·1 answer
  • Display the Approval Form worksheet and create an IF statement in cell B13 to determine if the applicant is eligible for a perso
    7·1 answer
  • Who designed the apple i computer in 1976?
    13·1 answer
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!