1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
8

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Computers and Technology
1 answer:
Tanya [424]3 years ago
3 0

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

<em>Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc. </em>

You might be interested in
How important "saving" in every individual?​
photoshop1234 [79]

Answer:

The importance of saving money is simple: It allows you to enjoy greater security in your life. If you have cash set aside for emergencies, you have a fallback should something unexpected happen. And, if you have savings set aside for discretionary expenses, you may be able to take risks or try new things.

4 0
2 years ago
There are five identical closed boxes. one box contains $10,000, two boxes contain $1000 each, one box contains $1, and the last
sp2606 [1]
Mean means most and the most he can get is the 10000 and the 2 1000s and the 1 dollar so the mean is 12001.
6 0
3 years ago
Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.
vredina [299]

Answer:

The answer is "Option c"

Explanation:

In the given question only option c is correct because "/27" is the IP "255.255.255.224" is the same as "/27" in the terminology in CIDR, in which it uses the compact IP address as well as corresponding prefix expression and it terminology consists of an IP with a slash ('/') or a decimal number. Its count of 1-bit proceeding to the mask traditionally referred to it as the network mask.

5 0
3 years ago
Amanda and her new team have a new client Who has come up with a difficult project. Which model will help Amanda and her team to
EastWind [94]
Iinear because it has to be straight and the true detention of linear is a straight line going through something
4 0
3 years ago
Read 2 more answers
How to find the biggest files on your computer?
ki77a [65]
For purposes of freeeing up some hard disk space and find the biggest files on you, there are couple of ways one can do so.
Using explorer, open my computer and then click on the search box at the top most right side. A little window will pop up with several options. Since you want to find the biggest files you will select size:Largest option. You can also press WIN + F on the keyboard and follow the same procedure.
4 0
3 years ago
Other questions:
  • Consider the following classes:
    8·1 answer
  • Create a class named CollegeCourse that includes the following data fields: dept (String) - holds the department (for example, E
    5·1 answer
  • A program requires that you change your screen size from 1024 X 728 to 800 X 600. In which of the following locations should you
    7·2 answers
  • A(n) _____ chart is drawn on the same worksheet as the data.
    9·1 answer
  • Select the correct answer.
    6·1 answer
  • Write a function namedmake_complex that stores its twoarguments (both of type double) in acomplex structure, then returns thestr
    12·1 answer
  • can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
    13·1 answer
  • Describe the steps to change an existing macro in Microsoft office 2016
    6·1 answer
  • Please help me !!
    10·1 answer
  • Which of the following correctly stores 45 squared in the variable x?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!