1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
14

A DNS server on your client's network is receiving a large number of DNS queries from what appears to be a workstation on their

network. On closer examination, the workstation does not appear to be the source of the DNS queries, but is receiving the responses from the DNS server. What type of attack best matches this description
Computers and Technology
1 answer:
drek231 [11]4 years ago
4 0

Answer:

The answer is reflective DNS attack

Explanation:

Reflective DNS Attack is used in many distributed DDoS attacks to knock down an internet pipe. The attack is divided in two stages: first  the attacker sends lots of requests to one  or more legitimate DNS servers  while using spoofed source IP of the target person, and then, in the second stage, the DNS server receiving the semi-legitimate requests replies to the spoofed IP, thereby unknowingly lauching an attack on the target computer with responses to requests never sent by the victim.

You might be interested in
The main thing that adjusting the aperture controls when taking an image is?
Pani-rosa [81]
The temperature controller
6 0
3 years ago
Can anyone build my blox burg castel.
lorasvet [3.4K]
No thanks maybe next time tho
6 0
3 years ago
Read 2 more answers
Which of the following tasks is least effective at preventing a computer virus?
Ksivusya [100]

Answer:

all of the above mentioned

5 0
3 years ago
Read 2 more answers
Explain the difference between using the int type and the double type for numbers.
MaRussiya [10]
They have different semantics, <span>addition to having different semantics from </span>double<span>, </span>int<span> arithmetic is generally faster, and the smaller size (32 bits vs. 64 bits) leads to more efficient use of caches and data transfer bandwidth.....
Did That Help You In Anyway </span>
6 0
4 years ago
The physical components of a computer are called hardware
jasenka [17]

Answer: Yes

Explanation:

Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. It is very important to have these parts, without them, your computer will not work.

4 0
3 years ago
Other questions:
  • Which of the following office online apps is most effective for creating multi media presentation
    10·2 answers
  • What is batch processing?
    12·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • How to transfer music from computer to iphone?
    5·1 answer
  • Which protocol is used for secure websites? <br> FTP<br> HTTP<br> HTTPS<br> SFTP
    10·1 answer
  • *When a computer programmer is finished writing or developing a program, what has to happen first before the computer can unders
    8·1 answer
  • Am I going to ever go back to school?
    12·2 answers
  • So this is what i use to code and all of that
    10·1 answer
  • Ang Kabihasnang ito ay umusbong sa rehiyon ng Timog Mexico
    6·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!