1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
10

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error.

The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning
Computers and Technology
1 answer:
OverLord2011 [107]3 years ago
5 0

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

You might be interested in
9 dmz, vpn, vlan where in the network do you place a dmx, why, what attacks are prevented? what does a vpn do, provide an exampl
creativ13 [48]

At the: Firewall, the DMZ is configured in the Organization. Within the firewalls, it is accessible. They have been completed with the intention of adding an additional layer of safety to the organization to protect it.

The DMZ safeguards not only the web server but also the remainder of the network. To allow visitors to the network to access the web server, a security breach must be made.

The DMZ lessens the possible risk caused by this gap. A secure network, protected by the FortiGate, that only permits access if it has been specifically authorized is known as a DMZ network (from the term "demilitarized zone").

In this illustration, a private subnet is used by the DMZ network, which permits access to a web server by internal and external users using distinct addresses while blocking access from the web server to the internal network in the case that the web server is compromised.

To know more about DMZ click on the link:

brainly.com/question/2920815

#SPJ4

7 0
1 year ago
A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the atte
11Alexandr11 [23.1K]

Answer:

Attenuation = 0.458\ db

Explanation:

Given

Power at point A = 100W

Power at point B = 90W

Required

Determine the attenuation in decibels

Attenuation is calculated using the following formula

Attenuation = 10Log_{10}\frac{P_s}{P_d}

Where P_s = Power\ Input and P_d  = Power\ output

P_s = 100W

P_d = 90W

Substitute these values in the given formula

Attenuation = 10Log_{10}\frac{P_s}{P_d}

Attenuation = 10Log_{10}\frac{100}{90}

Attenuation = 10 * 0.04575749056

Attenuation = 0.4575749056

Attenuation = 0.458\ db <em>(Approximated)</em>

7 0
4 years ago
Write C++ code to open a document with the name Hello.txt, place the message "Hello, World!" in the document, and exit the docum
gavmur [86]

Answer:

#include<iostream>

#include<fstream>

using namespace std;

int main()

{

ofstream out;

out.open("Hello.txt");

out << "Hello, World!"<< endl;

out.close();

ifstream in;

in.open("Hello.txt");

while(in.good()){

   string line;

   in >> line;

   cout << line << endl;

   

}

in.close();

return 0;

}

Explanation:

Step 1:

Add all your preprocessor files directive,  #include is known as the preprocessor  is used to load files needed to run the code.

#include<iostream>: it provides basic input and output services for C++ programs.

#include<fstream>:used to open a file for writing and reading

using namespace std; means you'll be using namespace std means that you are going to use classes or functions (if any) from "std" namespace

Step 2:

ofstream out; <em>his  is  used  to  create  files  and   write data to the file</em>

out.open("Hello.txt"); <em>  a new file "HELLO.txt" has been created</em>

out << "Hello, World!"<< endl;  "<em>Hello World!" has now been writen to the file</em>

out.close(); <em>The file is now closed</em>

<em>This second step opens a new file and writes hello world to the file then closes it.</em>

Step 3:

<em>ifstream in; ifstream in c++ is a stream class which stands for input file stream a  is used for reading data from file.</em>

in.open("Hello.txt"); <em>Reopens the file without recreating it. This is a very important step because if not done properly, you might discard the file you previously created and recreate it.</em>

while(in.good()){

<em> in.good() is true if the previous read operation succeeded without EOF being encountered</em>

   string line; <em>It declares a string variable line</em>

   in >> line; <em>reads the data into the line variable</em>

   cout << line << endl; <em>Prints out the line</em>

<em>reopens the file and read the message into a string variable "line".  prints out line then exits out of the file.</em>

5 0
3 years ago
To draw a clustered cylinder chart, first select the data to be charted and then click the column button (insert tab | charts gr
d1i1m1o1n [39]
It is true that to <span>draw a clustered cylinder chart, first select the data to be charted and then click the column button (insert tab | charts group).</span>
5 0
4 years ago
Convert 1/32 GB into MB​
kiruha [24]

Answer:

31.25 megabytes.

31.25 megabytes

7 0
3 years ago
Other questions:
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • Who is the last person appointed to the u.s supreme court
    11·1 answer
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
  • Complete the do-while loop to output every number form 0 to countLimit using printVal. Assume the user will only input a positiv
    9·1 answer
  • #Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
    7·1 answer
  • Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthe
    6·1 answer
  • The quicksort pivot value should be the key value of an actual data item; this item is called the pivot. True or False?
    11·1 answer
  • What is ana absolute adress
    11·1 answer
  • Firestick optimizing system storage and applications loop
    12·1 answer
  • Do you think that the TV set has outlived its utility as a household appliance? Research how convergence with internet technolog
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!