Answer:
Explanation:
1. 2 Modules that can be used for systems
integrations are
A. Automation integration modules
B. Flownex integration modules
2. Benefit of systems integration
A. It helps improves efficiency in integrating with external softwares
B. It helps with business to businesses communications and enhances interrnal co-operation within organization.
Answer: Constructors can specify parameters but not return types.
Explanation:
public class Student {
int roll_no;
public Student(int a) {
roll_no = a;
}
public static void main(String[] args) {
Student abs = new Student(10);
System.out.println(abc.roll_no);
}
}
In the above code we have illustrated the working of constructors. We have a class with the name Student. then a constructor is created of the class called as the class constructor. In the main we create an object of the class and with this object we invoke the constructor and also pass a parameter. Here in the code we are passing the roll no of the student.
So we can say that constructor is called during the runtime when the object created invokes the constructor so a constructor can have many arguments but it does not have a return type.
Answer:
The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.
In systems we have ping utility, that is based on ICMP protocol. Its function is to check the end to end connectivity of the system.
In this case a fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.
The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.
Explanation:
Solution
Ping Flood Atack:
In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.
Defence against this attack:
In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.
The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.
Blocking ping packets to avoid ping flood attack:
Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.
Answer:
DynamoDB is the correct answer of this question.
Explanation:
DynamoDB is a completely controlled NoSQL server website that allows server tables to be generated that can store and recover any amount of information.DynamoDB is an Amazon Web Services server platform that promotes software architectures and web resources priced by key.
DynamoDB can accommodate over 10 billions requests in a day, and therefore can sustain peaks of over 20 million queries per second.
If u dont have anything important on there reboot it if you do choice 5