1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
6

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server

or network?
Computers and Technology
1 answer:
rjkz [21]3 years ago
8 0

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

You might be interested in
Plsss help me<br>give two examples of problems that can occur when sytems do not work properly​
melomori [17]

Answer:

Explanation:

1. There can be a run out of something ex. The water cycle we could run out of water if evaporation stops happening

2. Something wont happen ex. In a shoe factory if no one is boxing the shoes the shoes don’t get boxed.

Hope this helps

6 0
3 years ago
Respond to the following in three to five sentences. Select one netiquette guideline. Explain how this helps you draft more effe
slamgirl [31]

Answer:

Keeping as few emoji's as possible. This helps because lots of emoji's can make things confusing and/or annoying. This just means being kind to the person you're messaging and not making things confusing.

8 0
3 years ago
Question #2
Bezzdna [24]
Computational thinking inclines invokes the techniques of decomposition, latter reconstruction, abstraction & algorithms development
3 0
3 years ago
Read 2 more answers
Write an algorithm to find the area of a parallelogram​
xeze [42]

Answer:

a = bh

Explanation:

a = Area
b = Base

h = Height

8 0
3 years ago
She has 12 circles and has to shade 3/4 how many does she shade​
Advocard [28]

Number of circles shaded = 3/4 x 12

                                           = 9 circles

Please mark Brainliest if this helps you! :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • Gloria needs to show in spreadsheet form the number of students in her class who speak different languages. Which type of graph
    7·1 answer
  • A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
    7·1 answer
  • Which of the following is NOT an option in the comments group
    12·1 answer
  • Please help me please
    6·1 answer
  • Write a program that tells what coins to give out for any amount of change from 1
    6·1 answer
  • The small company where you work needs to implement a second server for its accounting system, but does not have the funds to pu
    11·1 answer
  • What are the benefits of team collaboration?
    13·2 answers
  • Which of the following is part of the 6-by-6 rule?<br><br> i need help!!!!!
    5·1 answer
  • Maria needs to use a requirement-gathering method that will help her provide a set of questions to the client. Which method shou
    11·1 answer
  • A(n) ________ is a program that takes advantage of very low-level operating system functions to hide itself from all but the mos
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!