1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna35 [415]
3 years ago
9

Jared does not update his computer’s system software. What threat does his computer face?

Computers and Technology
1 answer:
hammer [34]3 years ago
5 0

the answer is not viruses it is actually hackers.

You might be interested in
Brent recently received funding for his fast-food chain in Michigan. As a result, he hires Angela to set up a top-level domain s
Elena-2011 [213]

The option among the top level domain names that Angela should opt for under such requirements is .biz.

<h3>What's a domain name? </h3>

Domain names are known to be formed to create IP addresses very easy so that one can easily remember.

Note that the domain name of biz is better for Angela to use as it is suitable for her business and as such, The option among the top level domain names that Angela should opt for under such requirements is .biz.

Learn more about domain name from

brainly.com/question/17062016

#SPJ1

5 0
2 years ago
Tracking a basketball's backspin with an internal sensor can...
valkas [14]
Help a player improve one part of this shooting technique
5 0
3 years ago
Which reports indicate how traffic arrived at a website?
umka21 [38]

Answer: All traffic reports indicate how traffic arrived at a website.

Explanation:

5 0
3 years ago
Who is the CEO of Epic Games?​
slavikrds [6]

Answer:

it's tim sweeney....

Explanation:

hope it helps

4 0
3 years ago
Read 2 more answers
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
Other questions:
  • Which of the following are valid values for a String? (Select all that apply)
    7·1 answer
  • Write a program that calculates the balance of a savings account at the end of a period of time. It should ask the user for the
    14·1 answer
  • Dusk is considered “a magic hour” by photographers and is the time when light is the least harsh. True or false.
    12·2 answers
  • When determining the amount of RAM necessary for a computer you wish to purchase, what should you consider?
    7·1 answer
  • The major difference between a calculator and a computer, when performing calculations, is that a
    12·1 answer
  • Can Any One Marry Baby YODA?
    9·2 answers
  • The Internet was first used by which of the following institutions?
    7·1 answer
  • What is the norm that psychoanalysis of Freud deviates?<br>​
    6·1 answer
  • The value that decides whether something falls into one category or another is called a ____
    13·1 answer
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!