1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Varvara68 [4.7K]
3 years ago
8

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Computers and Technology
1 answer:
Tanya [424]3 years ago
3 0

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

<em>Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc. </em>

You might be interested in
When microsoft released word for windows, wordperfect had about 80 percent of the word processing market. microsoft donated free
irina1246 [14]

When Microsoft donated copies of Word program to colleges and universities, the company Microsoft is using a Marketing Strategy in promoting the product. A good promotion will help the product to be known and by words of mouth it will basically promote the product and the users will definitely give comments on how the product performs.

7 0
3 years ago
In designing input by clinicians for an EHR system, which of the following would be effective for a clinician when the data are
svetoff [14.1K]

Answer:

Speech recognition

Explanation:

Speech recognition would be effective for a clinician when data entry is fairly repetitive and the vocabulary used is fairly limited and over time it as become a replacement for other forms of dictation.

3 0
4 years ago
Is Bob Lazar telling a lie/withholding information?
Anon25 [30]

Answer:

I think he may be a nut, but I'm not sure, there's little evidence of what he says to be true.

6 0
3 years ago
The S in SQRW stands for....
user100 [1]
B.................................
8 0
3 years ago
Read 2 more answers
What is a bug?
Stels [109]

Answer:

a defect in a software program that prevents it from working correctly

Explanation:

got it right on edge2021

6 0
3 years ago
Other questions:
  • In the u.s.all financial institutions are required to conduct business at a physical location only
    9·1 answer
  • trhy356<br>yjetyi46ui y j4yhnpug 2utg[ 2[ 24[ou [o24t
    15·1 answer
  • How do I get more points?
    13·2 answers
  • Write another function to convert a value to its word equivalent leveraging the following tuple - o Number = (‘One’, ‘Two’, … ‘N
    10·1 answer
  • Define an organizational unit in your own words.
    11·1 answer
  • What type of result does the MATCH function, when used on its own, return?
    5·1 answer
  • A computer can function in the absence of software true or false​
    15·2 answers
  • 6.5 Code Practice: Question 1
    13·2 answers
  • A single instruction carried out by a computer is called a what?
    5·1 answer
  • Construct sequence using a specified number of integers within a range. The sequence must be strictly increasing at first and th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!