1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnZ [28]
4 years ago
12

A reflective attack can be increased in intensity by combining it with what type of attack

Computers and Technology
1 answer:
Svet_ta [14]4 years ago
6 0
​A reflective attack can be increased in intensity by combining it with an amplification attack.
The amplification attack is a distributed denial of service (DDos) attack<span>. 
</span> A DNS look-up request is sent using the spoofed IP address of the target to vulnerable DNS servers.<span> </span>
You might be interested in
A ________ refers to specific content of a field.
mixer [17]

Answer:

C- Record

Explanation:

People use a fields record to keep track of its background , etc

7 0
4 years ago
If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to
Y_Kistochka [10]

Creating users:

We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).

In its basic form, the command is as follows:

  • [Options] useradd username

Take this user olivia, for instance. Assuming that you had been to issue the command prompt:

  • olivia has become a user.

Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?

  • sudo using useradd -m olivia

Using the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".

But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:

  • Password for olivia is: sudo passwd olivia

You'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.

This command might look like if you wanted to accomplish it in one go:

  • sudo useradd -m olivia -p PASSWORD

You should be using Passcodes as the login for the user olivia.

As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.

To create a user that has no personal account and cannot log in, execute the following instructions:

  • sudo use useradd as  the-M USERNAME 
  • ​sudo use usermod as the -L USERNAME

The user to be added is identified by USERNAME.

It establishes a user with really no root folder and prevents them from signing in with a second operation.

To add an existing user to a group on Linux, follow the instructions:

  • As root, log in to your account
  • Use the useradd instruction to add a new user (for example, useradd roman)
  • If you'd like to log on as a new customer, type su plus that user's name.
  • Entering the word "exit" will logout you from your account.

Another way to add a user to a group under Linux would be to use the following syntax:

  • Alternatively, you can use the usermod command.
  • The name of the club should be substituted for example group in this sentence.
  • Example username should be replaced with the name of the user you'd like added.

The following operations are performed when a new login is added to the system.

  • The user's home directory (/home/username by default) is now created.
  • To set configuration files for the user's session, the following secret files are copied into another user's home directory.

.bash_logout

.bash_profile

.bashrc

  • /var/spool/mail/username includes the user's mail spool.
  • The new user account is arranged in groups with the same name.

Learn more:

Linux system: brainly.com/question/13843535

7 0
4 years ago
What is the khan academy game where it is a block having to jump over lava and is an endless runner
saw5 [17]

Answer:https://www.khanacademy.org/computer-programming/lava-the-impossible-game-by-swax97/4638717300965376/embedded?id=1436456095000-0.5&origin=undefined&buttons=yes&embed=yes&editor=no&author=yes

Explanation:

5 0
4 years ago
8. SQL, Oracle Report, and Visual Basic are all examples under the
Marat540 [252]
I am pretty sure the answer is the second gen
3 0
2 years ago
In a certificate authority (ca) infrastructure, why is a client certificate used?
devlian [24]

The client certificate that is used as part of the authorizations before launching a secure connection.

<h3>What is a client certificate?</h3>

A client certificate is a form of digital certificate that is used to make authenticated request to a remote server.

In this case, the client certificate is used as part of the authorizations before launching a secure connection.

Learn more about certificate on:

brainly.com/question/24931496

#SPJ12

4 0
2 years ago
Read 2 more answers
Other questions:
  • How can you best protect yoursel and when using social media
    14·2 answers
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • Uugurfofyhjfsjvrdjctstghfjddd
    13·1 answer
  • Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of
    9·1 answer
  • A cost-benefit analysis is intended to increase the likelihood that a support analyst has considered the major advantages and di
    5·1 answer
  • In what year did the manager and team depicted in the blockbuster film "Moneyball
    9·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • What is the purpose of a Macro in Word?: *
    13·1 answer
  • What kind of power does Tesla Model S, 3 X, and Y use?
    8·2 answers
  • In this lab, you open a file and read input from that file in a prewritten C program. The program should read and print the name
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!