1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anika [276]
3 years ago
12

You are the security administrator for a bank. The users are complaining about the network being slow. It is not a particularly

busy time of the day, however. You capture network packets and discover that hundreds of ICMP packets have been sent to the host. What type of attack is likely being executed against your network?
A. Spoofing
B. Man-in-the-middle attack
C. Password attack
D. Denial-of-service attack
Computers and Technology
1 answer:
bulgar [2K]3 years ago
3 0

Answer:Denial of service

Explanation:Denial of service is the type of attack that is caused to the computer attacks. These attacks basically cause the circumstances such as difficulty in accessing of the website or resource, accessing particular computer system , creation of the traffic in network, This attack occurrence stops or create difficulties for the legal person to access the network .

Therefore, there is the occurrence of the Denial of service(DoS) in the bank's computer network.

You might be interested in
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network res
Citrus2011 [14]

Answer:

"Direct access" is the correct answer for the above question .

Explanation:

  • Direct access is a feature available in the window server of the 2016 version. It is used to allow access to the computer system program and the internet remotely behaves like that computer or network is his computer or network.
  • It allows remote users to do anything with the help of an internet connection. But it can be done with the authorization of valid users.
  • The above question states about the features which grant to access the internet for the remote users and this is available in window server 2016. This feature is known as "Direct access".
7 0
4 years ago
What is the maximum number of guesses it will take to find a number <br> between 1 and 64?
ryzh [129]

Answer:

10?

Explanation:

3 0
2 years ago
Which describes the safest way to sit at a desk while typing on the computer?
Anna35 [415]

Answer:

Keep the knees and hips at 90-degree angles and the wrists straight.

Explanation:

From computer ergonomics, sitting at a desk and typing can affect the back, cause discomfort and sometimes injury. To protect the back, always sit with the knee and hips positioned at 90 degree while keeping the wrist straight and also position the equipment appropriately to always suite this posture.  

7 0
3 years ago
What kind of material is used for DRAM (dynamic random-access memory)?
Alex Ar [27]

The kind of material that is used for DRAM (dynamic random-access memory) is metal-oxide-semiconductor.

<h3>What is DRAM?</h3>

DRAM was invented in 1968. It is a type of RAM used in modern computers and laptops. It is a type of random access memory. Its name is dynamic random access memory.

Metal-oxide-semiconductor is used in making the transistors and capacitors of the DRAM, which are used to store the data. They hold a bit of the data in these capacitors and transistors.

Thus, the material that is used is metal-oxide-semiconductor to make DRAM (dynamic random-access memory).

To learn more about DRAM, refer to the link:

brainly.com/question/20216206

#SPJ1

3 0
2 years ago
In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
katen-ka-za [31]

Answer:

Web server

Explanation:

4 0
3 years ago
Other questions:
  • Is I5 9100 is better than i5 9400
    6·1 answer
  • Ponce is the largest city on which coast of Puerto Rico
    13·1 answer
  • A stack queue can be implemented as a circular array stack dynamic linked list dynamic vector none of these
    5·1 answer
  • How far from the bullet is text indented
    6·2 answers
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • On net, is technology good or bad for society? Please explain, support your argument, I’ll mark brainliest
    9·2 answers
  • Which of these is not the correct method for moving text in a document in Word 2016?
    7·1 answer
  • What does the action tool allow you to do in Microsoft Powerpoint?
    15·1 answer
  • Plz help me I need help​
    6·1 answer
  • If you are going to analyze and interpret data, you need to do all of the following execept blank.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!