1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
4 years ago
9

A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in

Computers and Technology
1 answer:
olganol [36]4 years ago
4 0

Legitimate users cannot get in due to Spear phishing attack

Spear phishing Attack

Explanation:

A spear-phishing attack typically employs a collection of zombie processes which keeps the target so occupied and busy in responding to a stream of automated requests generated by these zombies. Due to this fact, the legitimate users cannot access the target. It is different from phishing. It is a targeted form of phishing. Spear phishing is an extremely common form of attack on businesses. Since it  is very much targeted, spear phishing is the most dangerous type of phishing attack as compared to other types of phishing attacks.

You might be interested in
After execution of the code fragment
lesya692 [45]
Yes the output is 6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  





8 0
4 years ago
Usted repetir la pregunta?<br>O A. Es<br>B. Puede<br>C. Puedes<br>O D. Está​
puteri [66]

Answer:

I believe the answer is B. Puede

5 0
3 years ago
Read 2 more answers
The digital wallet stores a user’s payment information such as bank account and credit card numbers, a __________ to identify th
lesya [120]

Answer:

Digital Certificate

Explanation:

3 0
4 years ago
Top-level domain names are sometimes called _____.
Xelga [282]
Internet domain extention 
4 0
3 years ago
Which option is used to ensure the integrity and authenticity of a Word document but requires additional services to be availabl
mel-nik [20]

Answer:

Digital signature.

Explanation:

Digital signature is used to ensure the integrity and authenticity of a Word document but requires additional services to be available on the internal network.

This is important as it makes sure that the file is authentic and not malware.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • A species of snake lives in a rainforest. Which would be an adaptation for this
    10·2 answers
  • Impaired drivers not only harm themselves but they harm other individuals and affect our _________________.
    15·2 answers
  • Write a program that records high-score data for a fictitious game. the program will ask the user to enter five names, and five
    12·1 answer
  • Write a C++ program that computes an approximation of pi (the mathematical constant used in many trigonometric and calculus appl
    15·1 answer
  • Which of these personal protective equipment items prevents injury from falling objects ?
    15·1 answer
  • Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is ide
    13·1 answer
  • Why was CDR the most developed country in nepal. Highlight any six reasons​
    9·1 answer
  • One difference between multi-tasking using fork() versus using threads is that there is race condition among threads due to shar
    5·2 answers
  • Why the computer is known as versatile and diligent device ? explain.<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!