1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
6

In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server

or network?
Computers and Technology
1 answer:
rjkz [21]3 years ago
8 0

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

You might be interested in
When using color in a computer - generated presentation aids you should use?
Temka [501]
<span>the answer is: the same background color on all visuals and no more than two colors for words.</span>
6 0
2 years ago
Microprocessor is what​
g100num [7]

Answer:

A microprocessor is a computer processor where the data and control is included in a single integrated circuit

Explanation:

7 0
2 years ago
given the numerical value 1010101.11, which of the following number systems is most likely represented.
nasty-shy [4]

Answer:

u have to give me more points

Explanation:

sorry

7 0
3 years ago
Please help me I don't understand. It's Python.
Vitek1552 [10]
It’s , c probably sorry if I’m wrong
8 0
2 years ago
Read 2 more answers
How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
AVprozaik [17]

You really cant without being admin. Calm yaself child

6 0
2 years ago
Other questions:
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • The very first thing I should type when creating a formula in excel is:
    15·2 answers
  • Design an algorithm for finding all the factors of a positive integer. For example, in the case of the integer 12, your algorith
    8·1 answer
  • What mass of nh3 can be made from 35g of n2?
    14·1 answer
  • When is Hytale coming out?<br><br><br> P.S it might be Mine-craft 2.0<br><br><br> :)
    7·1 answer
  • Car batteries have two terminals which are (blank).
    8·2 answers
  • ECG mashine is an example of
    12·1 answer
  • Consumer consequences for illegally downloading software
    6·1 answer
  • 19. List three things you can do to protect your online reputation:
    7·1 answer
  • The G&amp;T Guild Charter uses some terminologies that contain the word Treasure'. Identify these terminologies.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!