1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
4 years ago
9

A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in

Computers and Technology
1 answer:
olganol [36]4 years ago
4 0

Legitimate users cannot get in due to Spear phishing attack

Spear phishing Attack

Explanation:

A spear-phishing attack typically employs a collection of zombie processes which keeps the target so occupied and busy in responding to a stream of automated requests generated by these zombies. Due to this fact, the legitimate users cannot access the target. It is different from phishing. It is a targeted form of phishing. Spear phishing is an extremely common form of attack on businesses. Since it  is very much targeted, spear phishing is the most dangerous type of phishing attack as compared to other types of phishing attacks.

You might be interested in
The type of line shown below represents an / a:​
VikaD [51]

Answer:

esrfsrtg

Explanation:

6 0
3 years ago
A(an) _______ is a set of instructions that a computer follows to perform a task.
Vikentia [17]
A(an) _______ is a set of instructions that a computer follows to perform a task.Answer is Program .
I hope the answer of the question.
7 0
4 years ago
What can Marla enter into cell A11 to find out how much money is left in her budget and to make sure the cell is updated wheneve
Nookie1986 [14]
Personally I have my budget spreadsheet with all of my expenses in columns. Then I have a column showing my estimated paycheck (updating with actual# later).  Then the formula in the "Remaining" column that I use is this:    sum((A1:A99)-A100)  Where A1 through A99 (or whatever# of expenses you have) and -A100 or whatever cell name your paycheck/money is entered into - and that's all I do.  I actually have a 3 year budget, including birthdays, holidays, vacations, etc. so that you can plan ahead for any expenses and save away any extra.
8 0
3 years ago
16. When the speed limit is not posted, the default
Elanso [62]

Answer:

C. 55, 30

Explanation:

Even though each state in the United States has different speed limits. However, in a situation whereby the speed limit is not posted, the default speed limit recommends that drivers maintain a speed of "55" mph on the highway and "30" mph in the city.

The highest speed limit in the United States is 85mph on a rural highway in Texas while the lowest generally for the country is 30mph in a residential area.

3 0
3 years ago
Angular when to use reactiveformsmodule.
WITCHER [35]

Answer:

Image result for Angular when to use reactiveformsmodule.

In summaries, if forms are very important for your app, or reactive pattern are used in your app, you should use reactive forms. Otherwise your app have basic and simple requirement for forms such as sign in, you should use template-driven forms

Explanation:

Each form has a state that can be updated by many different interactions and its up to the application developer to manage that state and prevent it from getting corrupted. This can get hard to do for very large forms and can introduce a category of potential bugs

3 0
2 years ago
Other questions:
  • The numbers on the bottom of a typical check represent all of the following EXCEPT?
    12·2 answers
  • Identify the parts used in an electric circuit- Tiles
    9·2 answers
  • Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. Th
    11·1 answer
  • In excel, you cannot format an entire column at once. true or false
    7·1 answer
  • My study background is business. I am doing a bachelor of business administration. My major course is management information of
    15·1 answer
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
    9·2 answers
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
  • Difine Mainframe Computer~<br><br><br><br><br><br><br><img src="https://tex.z-dn.net/?f=%20%5C%3A%20%20%5C%3A%20" id="TexFormula
    12·2 answers
  • what is the greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!