1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
10

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error.

The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning
Computers and Technology
1 answer:
OverLord2011 [107]3 years ago
5 0

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

You might be interested in
How to change default search engine in internet explorer 10?
ser-zykov [4K]
Settings > view advanced settings > change search engine > Google search > set as default
7 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Kamila [148]

Answer:emphasis

Explanation:

7 0
3 years ago
Write steps of the following operations.<br>a. applying borders and spacing<br>b. create a folder​
slava [35]

Answer:

b

Explanation:

first right click on an empty space

click on new from the pop up menu

finally click on new folder

7 0
3 years ago
Which kind of image is indispensable and needs added text to go with it?
STatiana [176]

Answer:

A chart and a graph

Explanation:

8 0
3 years ago
What are some of the risk associated with professional emails
noname [10]

Answer:

the answer is its a lot of riskes you would have to worry about tour email getting haacked into and lossing all of your personal information

Explanation:

5 0
3 years ago
Other questions:
  • Two columns of a relational table can have the same names. <br> a. True <br> b. False
    15·1 answer
  • What does it mean if the phone number is red on iphone?
    13·1 answer
  • The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requir
    8·1 answer
  • What is a new technology in computer science that is emerging to solve a social, economic, or technological problem.
    9·1 answer
  • How was the addition of an improvement over early web design?
    11·1 answer
  • In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark govern
    6·1 answer
  • int FindFirstCharFrom(char* str, char *sought); The function FindFirstCharFrom takes pointers to two C strings as arguments, str
    13·1 answer
  • What is range work book​
    8·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
  • Which statement best describes the logic in a while loop?bringing an umbrella to determine if it is rainingbringing an umbrella
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!