1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
uysha [10]
3 years ago
14

Jason is the local network administrator who has been tasked with securing the network from possible DoS attacks. Within the las

t few weeks, some traffic logs appear to have internal clients making requests from outside the internal LAN. Based on the traffic Jason has been seeing, what action should he take?
Computers and Technology
1 answer:
d1i1m1o1n [39]3 years ago
8 0

Answer: Implementing ingress filtering.

Explanation: Ingress filtering is the method that is deployed for checking whether the data packets arriving at the destination are actually coming from the claimed source or not.They helps in the prevention of the unwanted traffic in the network paths.

This techniques is used by internet service providers, enterprises and other organization for the protection from malicious traffic. This mechanism can also behave as the packet filtering device.Thus,Jason should use ingress filtering for maintaining security of the local network from any attack.

You might be interested in
You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the
gulaghasi [49]

Answer:

Access installation through shared drive

Explanation:

4 0
3 years ago
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
Anvisha [2.4K]

Answer:

import random

numbers = []

even = 0

odd = 0

for i in range(100):

   numbers.append(random.randint(1, 200))

for i in range(100):

   if numbers[i] % 2 == 0:

       even += 1

   else:

       odd += 1

print("Even:", even)

print("Odd:", odd)

Explanation:

Gg ez.

8 0
3 years ago
If two devices simultaneously transmit data on an Ethernet network and a collision occurs, what does each station do in an attem
Arada [10]

Explanation:

Both station will retract their data. They will wait a random amount of time before sending out data again. This lessens the chance of collision again.

8 0
2 years ago
A complete traversal of an n node binary tree is a(n)____ "operation if visiting a node is O(1)for the iterative implementation
ch4aika [34]

Answer:

B.O(n).

Explanation:

Since the time complexity of visiting a node is O(1) in iterative implementation.So the time complexity of visiting every single node in binary tree is O(n).We can use level order traversal of a binary tree using a queue.Which can visit every node in O(n) time.Level order traversal do it in a single loop without doing any extra traversal.

8 0
4 years ago
A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
Bess [88]
To be honest I feel like it’s B that’s looks and seems the most correct to me
8 0
3 years ago
Other questions:
  • Software design and implementation are interleaved activities. The level of detail in the design depends on the type of system b
    5·1 answer
  • What does zooming do? A. Changes your view of the Frame Editor to be closer or farther away B. Changes your view of the Event Ed
    12·1 answer
  • What is one course of action available in every problem solving process?
    9·2 answers
  • Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are impleme
    15·1 answer
  • You are system administrator with hundreds of host workstations to manage and maintain. You need to enable hosts on your network
    14·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • Which memory can be removed from motherboard? RAM OR ROM?​
    11·1 answer
  • Selma writes the following four answers in her Computer Science examination.
    8·2 answers
  • What does mean in computer science
    10·1 answer
  • A word or phrase to help identify a file when you do not know the file name during the file expiration search
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!