1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitry [639]
3 years ago
12

Which type of denial of service attack exploits the existence of software flaws to disrupt a service?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
4 0
<span>The denial of service attack that exploits the existence of software flaws to disrupt a service is the teardrop attack. </span>The teardrop attack exploits flaws in the way older operating systems handled fragmented Internet Protocol (IP) packets.
<span>Fragmented packets are sent to a target machine but the target machine  cannot reassemble them due to a bug in TCP/IP fragmentation reassembly, the packets overlap one another. This results in crash in the target network device. </span>
You might be interested in
All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ab
mel-nik [20]

Answer:

The answer is "option C".

Explanation:

The change in technology can be characterized as that of an increase in the production feasible thru the innovations, new technologies, and dispersion procedures at a specified amount of production. This technology concerns the Excluding area of special events, even if it needs the new master software and applications continuously, and the wrong choices can be defined as follows:

  • In choice A, it is a part of event management that's why it is wrong.
  • In choice B it is wrong because it is used in learning.
  • In choice D, it is wrong because it is used to make progress.
4 0
3 years ago
Complete each sentence using the drop-down menu. Information on local driving laws can be found on a website. A class textbook c
zheka24 [161]

Answers:

1. D

2. A

3. B

4. C

Explanation: I just did it and got a 100%

7 0
3 years ago
Read 2 more answers
Javier develops sophisticated fashion websites. He has been asked by the owner of a leading fashion brand to create web content
saul85 [17]

Answer:

hyperlinks

Explanation:

Javier should use hyperlinks to show the users the possible choices for their clothing.  This is really a terrible question and not likely in any real world scenario.  Fashion is always forward thinking and on the cutting edge.  When was the last time you went to a fashion website and were left with only choices to click on a hyperlink?  As Tim Gun would say "Make it work."  If I were able I would include a hyperlink using the previous sentence as the clickable link with a URL reference to

https : //en.wikipedia.org/wiki/Tim_Gunn (spaces after https to make this link not get censored)

to illustrate the way to show that hyperlinks have no real application on modern fashion website.  But they would have great utility here inside the answers section.  But they also are cause for a securtity concern and may be killed by the moderators

7 0
3 years ago
Are commonly used to control the number of times that a loop iterates?
pickupchik [31]
Hmm... I feel like this query is much broader than it should be. However, I will start my initial answer, then another potential solution.

My initial answer to your query was: A condition controlled loop is used to control the number​ of times a loop iterates.

The potential answer, my secondary one, is: A count controlled loop iterates a specific number of times.

Two results, but my initial answer is the solution I opted when understanding this.
5 0
3 years ago
Creating a wedding website on the knot- how to make the text wide
Nady [450]

Answer:

go to the side with you mouse drag it ove or the restoere down button at the top right in between the - and the x hope this haelp may you mark me as brainlyest pls and thank you have a  bless day <3

Explanation:

3 0
2 years ago
Other questions:
  • What does delegating access give someone the permission to do on behalf of the user? Choose two answers.
    5·1 answer
  • 2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by
    13·1 answer
  • Under which market structure, does a firm have the most influence over product pricing? A. Oligopoly B. Perfect competition C. M
    5·1 answer
  • Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word
    15·1 answer
  • The computer has had far-reaching effects on our lives.how has the computer effected your life?
    8·1 answer
  • Use the drop-down tool to select the word or phrase that completes each sentence.
    7·1 answer
  • Is there anyone that knows how to work in Microsoft Access and someone that could help me on my test at 11 30am?​
    7·1 answer
  • (b) Cell B12 contains the formula, ROUND((SUM(B5:B9)*D1),1).
    15·1 answer
  • A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
    6·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!