1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
7

In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo

rs dos clients dos servers
Computers and Technology
1 answer:
kirill115 [55]3 years ago
4 0
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
You might be interested in
How does a Cloud-first strategy differ from other approaches to Cloud?
Brut [27]

Answer:

There is a considerable difference between a cloud-first strategy and other cloud approaches. The developers of the cloud-first strategy are familiar of every data point that requires backup and synchronization. As a result, a lower assembly layout that is more tolerant of database sync is required. In other words, a cloud-first strategy can easily accommodate new technology.

Cloud-first strategy is the current data management method that was not available a few years ago. Such processes and reliability are inapplicable when transferring application software and data to the cloud. You will have to make sacrifices in terms of load balancing and distributed functionality, which will be limited when using other cloud approaches. And this is where Cloud-first strategy shines, as you will be able to control and use all of the host's functionalities.

Explanation:

A cloud-first strategy is one in which all or most of an organization's structure is moved to a cloud-computing environment. Traditionally, organizations required physical supplies to keep their online data; nowadays, they store it on the cloud, which is fundamentally more useful. Cloud-first organizations, regardless of size or importance, are designed to operate their operations on cloud servers. Rather of transferring the organization's data and services to the cloud, adopt a cloud-first strategy and design the application software from the ground up. Not only does the cloud-first strategy outperform traditional application architectures in terms of performance, but it also provides higher stability.

5 0
1 year ago
Using e-mail has decreased the number of hand-written letters that people send to their friends and relatives. this is a ____ fu
k0ka [10]
Hello <span>Alexkalhor5415

</span>Answer: Using e-mail has made it easy, fast, and inexpensive for family members who live in different parts of the united states to keep in touch. this is a positive  function of e-mail.
Hope this helps-Chris
6 0
3 years ago
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
The fastest way to get help is to type a word or two in the search box.
Elanso [62]
The fastest way to get help is to type a word or two in the search box. TRUE.
5 0
3 years ago
Security administrators can use either the PowerShell command line or the graphical user interface of the Server Managerâs Roles
AleksAgata [21]

Answer:

Security administrator can use power shell command line or the GUI to "Promote a windows server to a domain controller".

Explanation:

A domain controller is a type of server that is used to authenticate the access of the system to the users to resources of windows. Power shell is an important tool that is used to perform different tasks of administration. We can user this tool as security administrator to Promote a Windows server to a domain controller.

3 0
3 years ago
Other questions:
  • Speech on inventors and inventions
    14·1 answer
  • Put the following numbers in order from greatest to least:
    13·1 answer
  • What happens if you give false information on your driver license application?
    12·1 answer
  • The array s of ints contain integers each of which is between 1 and 1000 (inclusive). write code that stores in the variable ord
    9·1 answer
  • Suppose the file is sent continuously as one big message. how long does it take to send the file, assuming it is sent continuous
    15·1 answer
  • python (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. T
    12·1 answer
  • Witch of the following is a valid why a scientist might a scientific theory
    13·1 answer
  • Instead of sending an entire file in one big chunk across the​ Internet, __________ is used which dices the file up into little
    12·1 answer
  • Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a d
    8·1 answer
  • [C++] 4.17 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!