Answer:
A closed port that can not receive request from authorized users.
Explanation:
Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.
Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.
DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.
<span>Documents, images and other data you can access by providing a uniform Resource Locator. URL - the Web Address
I hope this helps. You didn't give me the choices to from. </span>
Answer:
The blocking system.
Explanation:
In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.
For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.
By this way, there won´t be any duplicated actions or reponses.