1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
14

A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their

network. On closer examination, the workstation does not appear to be the source of the DNS queries, but is receiving the responses from the DNS server. What type of attack best matches this description
Computers and Technology
1 answer:
drek231 [11]4 years ago
4 0

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

You might be interested in
One of the main reasons for copyright law is to encourage creators to share their work for the benefit of the general public. Pl
irina [24]

Answer:

ewatuqhfuyerhjf

Explanation:

true

8 0
3 years ago
HTML tags normally come in pairs like and The end tag is written like the start tag, but with a backward slash inserted before t
baherus [9]

Answer:

<bold> Hm ok, what is the question? </bold>

4 0
4 years ago
Suppose within your Web browser you click on a link to obtain a Web page. The IP address for the associated URL is not cached in
Firdavs [7]

Answer:

RTT1+ RTT2+..... RTTn

Explanation:

The total estimated time to get the IP address is

RTT1+ RTT2+..... RTTn

Once the IP address is known, O RTT elapses to set up the TCP connection and another O RTT elapses to request and receive the small object. The total response time is

2RTT0+RTT1+RTT2+.....RTTn

7 0
3 years ago
Questions about the data policy and privacy policy of YT
Ilya [14]

Answer:

I'm confused

Explanation:

7 0
3 years ago
Create a new program in python that:
LiRa [457]

Answer:

here

Explanation:

If you want to display something on screen you can use the print() function. ... An example of code that will ask the user to enter their name and display it on ... stores it in a variable called city city = input("What is the capital city of England ... If you want to perform a format check in Python you will need to make use of a library.

6 0
3 years ago
Other questions:
  • Which option best describes the cheapest way to file your federal income taxes?
    5·1 answer
  • Which pair of Information Technology career fields may require work to be done outside of normal office hours? interactive media
    8·2 answers
  • ith reference to McCall's quality modle , what are the three important aspects of a software product ?
    7·1 answer
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • Why would an information systems security practitioner want to see network traffic on both internal and external network traffic
    5·1 answer
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
  • MSWord is a popular___________ program.​
    7·2 answers
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
  • Which type of relationship is responsible for teaching you values and how to communicate?
    9·1 answer
  • Question # 5
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!