1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
10

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr

om a small number of sources.
Computers and Technology
1 answer:
Travka [436]3 years ago
3 0

Answer:

denial of service

Explanation:

You might be interested in
Which of the following is NOT included in the entry career pathway?
SVETLANKA909090 [29]
Looking for jobs is NOT included in the entry career pathway. When you state entry career path, you need to reconsider what kind of job you are going to proceed in. 

Happy studying ^-^
3 0
3 years ago
Read 2 more answers
Because health and safety are important in all workplaces, not just hazardous ones, what working conditions must ALL employers p
antiseptic1488 [7]
A since fire extinguishers are legally enforced 
5 0
4 years ago
Read 2 more answers
Eniac was the first desktop computer. t/f
LekaFEV [45]

Answer:

The answer is "False".

Explanation:

ENIAC stands for Electronic Numerical Integrator and Computer, It was first developed in 1946. This computer use circuits and node that are interconnected with each other to show the result.

  • ENIAC was a firstly, Reconfigurable vacuum tube, that controls the unit and it doesn't store information
  • It takes a large room to set up the system, that's why it is not true.

6 0
4 years ago
You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
shepuryov [24]

Answer: Flag

Explanation:

When using an application control solution, it should be noted that the application whitelist is typically centrally defined which is applied to the network devices. In such case, the applications that are contained in the whitelist will be the only one that are allowed.

Therefore, the applications that are not contained in the whitelist should be flagged. This is necessary in order to effectively monitor the user traffic for a period of time in order to discover user behaviors.

5 0
3 years ago
Finish the sentence. If the IP address and MAC address are parameters of layer 3 and layer 2, respectively, a port number is a p
stepan [7]

Answer:

Layer 4

Explanation:

MAC address works at the data link layer (layer 2) of the OSI model. Mac address allows computers to uniquely identify themselves in the network

IP Address is a logical address that works at the network layer of OSI model (layer 3) (actually the IP layer of TCP/IP model).

The port number works at the transport layer of the OSI model (layer 4).The port number uses sequence number to send segments to the correct application thereby ensuring they arrive in the correct order.

7 0
3 years ago
Other questions:
  • Create a string called alphabet containing 'abcdefghijklmnopqrstuvwxyz', then perform the following separate slice operations to
    14·1 answer
  • This was a quiz that I submitted earlier in the semester but I had not received full points due to a coding mistake. Below, I wi
    14·1 answer
  • Which of these is an off-site metric for social media marketing?
    8·2 answers
  • Special variables that hold copies of function arguments are called _________.
    11·1 answer
  • You install a new driver, but your device still doesn't work. What is the first thing you should do?
    14·1 answer
  • What are the answers to 14 and 15
    10·1 answer
  • Kenny needs to keep client information such as names and addresses. She should use a
    7·2 answers
  • Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?
    15·1 answer
  • Please tell fast plzzzzz​
    9·2 answers
  • The internet is controlled by ______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!