1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
14

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr

opriate to make their activities more difficult to detect?
Computers and Technology
1 answer:
solniwko [45]3 years ago
4 0

Answer:

limit their scan speed

Explanation:

Based on the information provided within the question it can be said that the best course of action in this scenario would be to limit their scan speed. This will slow down the progress of the attack and at the same time allow you to verify where the attack is coming from and choose a course of action in order to stop the attack completely.

You might be interested in
1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
Mrrafil [7]
It mainly just depends on if you "misuse" them.
8 0
3 years ago
Text and graphics that have been out of copied are stored in area called the _____
rodikova [14]

Answer:

Clipboard

Explanation:

when we cut or copy a text ,it is stored into a temporary storage called clipboard . clipboard is a temporary storage where text or graphics cut/copied is stored until it is pasted .

4 0
3 years ago
Read 2 more answers
In tableData the column variable of the first column should be RowerNames, the second RowingEvent, the third RowerWeight and the
maxonik [38]

Answer:

Required MatLab code is given below:

Explanation:

function tableData=CreateTable(Names, Event, Weight)

% Matlab function to create a table from the given input arrays

% Inputs:

% Names will be n x 1 string array,

% Event will be n x 1 string array,

% Weight will be n x 1 double column array.

% Outputs:

% tableData : where column variables are : RowerNames, RowingEvent,

% RowerWeight and WeightCategories

WeightCategories = ""; % create an empty WeightCategories array

% loop over the Weight column array, populate the WeightCategories

% based on Weight

for i=1:length(Weight)

if(Weight(i) >= 100 && Weight(i) < 150)

WeightCategories(i) = "light weight";

elseif(Weight(i) >= 150 && Weight(i) < 200)

WeightCategories(i) = "medium weight";

else

WeightCategories(i) = "heavy weight";

end

end

% create the table with arrays Names, Events, Weight and

% WeightCategories by taking transpose of WeightCategories as WeightCategories is a row array

tableData = table(Names,Event,Weight,WeightCategories','VariableNames',{'RowerNames','RowingEvent','RowerWeight','WeightCategories'});

end

%end of function

8 0
4 years ago
Someone receives and email that appears to be from their bank requesting them to verify account information, this type of attack
svetoff [14.1K]

Answer:

<h2>This is Phishing attack</h2>

Explanation:

What is Phishing attack?

Phishing attack involves sending of sending of unwanted spam mails, well disguised mails to potential victims, it was designed to steal the potential victim's information such as passwords and mails to his/her banking platform.

     

      The goal is  to deceive victims into clicking on a link and taking them to a  website that asks for their login and password, or  perhaps their credit card or ATM number.

People who attack using phishing are called <em>cyber attackers</em>

6 0
3 years ago
Who would use a magnetic hard drive? Give a scenario and include examples as well as detail.
dybincka [34]
A magnetic hard drive well all hardrives have a magnet n them id say if it was to withstand heat so it whould stay on the magnet therefore not compromising the data <span />
3 0
4 years ago
Other questions:
  • In a _____, if any link between nodes is severed, the entire network is affected, and failure of a single node disrupts the enti
    9·1 answer
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 t
    15·1 answer
  • - The concept of communication competence suggests there is no single "ideal" or "effective" way to communicate in every situati
    6·2 answers
  • What pattern is a heart-shaped pattern that captures sound from a single direction, ?from the front?
    5·1 answer
  • A device can transport objects instantaneously anywhere in the world without damaging them. Is it a creative invention? Yes, bec
    6·1 answer
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • Can nano gold be a way possibly reduce or kill cancer cell growth?
    13·1 answer
  • What standards organization maintains the ethernet standard?.
    12·1 answer
  • Explain the role and importance of ict in daily life ?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!