1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
14

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr

opriate to make their activities more difficult to detect?
Computers and Technology
1 answer:
solniwko [45]3 years ago
4 0

Answer:

limit their scan speed

Explanation:

Based on the information provided within the question it can be said that the best course of action in this scenario would be to limit their scan speed. This will slow down the progress of the attack and at the same time allow you to verify where the attack is coming from and choose a course of action in order to stop the attack completely.

You might be interested in
Which of the following is a property of TCP?
Serggg [28]

Answer:

o best effort

Explanation:

beacuse it i think do

3 0
3 years ago
Which of the following are steps your employer can take to protect you from
lawyer [7]

Answer:

An employer with workers exposed to high temperatures should establish a complete heat illness prevention program. Provide workers with water, rest and shade. Allow new or returning workers to gradually increase workloads and take more frequent breaks as they acclimatize, or build a tolerance for working in the heat.

5 0
3 years ago
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
MrRissso [65]

Answer:

DDoS

Explanation:

Distributed Denial of Service

5 0
3 years ago
What type of printer heats toner to adhere it to the paper? inkjet . impact. 3D. laser.
Luden [163]

Answer:

laser

Explanation:

These are well known printer types now.  Let's review how they work to determine in which does heat plays a role.

inkjet: inkjet printers are printer throwing ink at the paper in the form of little drops.  No heat involved here.

impact: That's the oldest technology, where a printing head is moving left and right to punch a printing ribbon and transfer ink onto the paper.  No heat involved.

3D: 3D printers don't usually use paper... as they use other materials to create a 3D representation of a model.  Heat is involved in the melting of the material before it's placed on the building model.  But no paper involved here.

laser: laser printers are working very much like a photocopier machine... memorizing the pattern to be printed, then transferring it onto paper... using heat.

8 0
3 years ago
Precautionary measures to be observed when using ICT tools​
Dafna11 [192]

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

  1. Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.
  2. Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage
7 0
3 years ago
Other questions:
  • How many possible values will an eight bit audio sample have
    14·1 answer
  • You can change the location of the layers panel on the screen by _____ .
    7·1 answer
  • On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
    5·1 answer
  • Write the class definition for a class named Employee. The class should include data members for an employee object%u2019s name
    12·1 answer
  • What are like arms surrounding all the other code blocks?
    11·2 answers
  • Please assist me with these questions - Do not send me links. Issues in opening the links:
    9·1 answer
  • Hey IM new uh what is this?
    5·1 answer
  • Given a string, an integer position, and an integer length, all on separate lines, output the substring from that position of th
    10·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
  • class Login: def __init__(self): self.login_name = 'none' self.login_password = 'none' # TODO: Define class method - check_crede
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!