1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
13

In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a

ttack packet. Will our attack succeed or fail
Computers and Technology
2 answers:
ale4655 [162]3 years ago
8 0

Answer:

Yes

Explanation:

The TCP communication between client and server is reliable, connection oriented and sequentially numbers transfered packets. The sequence number is used to rearrange packets at the destination since TCP protocol propagates packets on different channels, which would stop the sequential arrival of packets.

A destination in a TCP transmission would accept and store any packet with sequence number, before rearranging.

Irina18 [472]3 years ago
4 0

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

You might be interested in
Could someone please help me with this?
Alexxandr [17]

Answer:

See explanation

Explanation:

Given

if(fish > 400) {

Required

What is the condition checking?

The above statement is an if conditional statement. Analysing the statement in bits:

if -> This represents the beginning of the conditional statement

fish -.> The variable that is being checked

> 400 -> The condition which the variable is being measured by.

So, the statement above is checking if the value of variable fish is greater than 400.

<em>If the condition is true, the instructions associated to that if statement will be executed.</em>

7 0
3 years ago
People of brainly Just a quick warning that there is a group of people posting links with virus.
valina [46]

Answer:

Thank you, they post on EVERY. SINGLE. QUESTION.

Explanation:

They keep posting the same file every time, but they might change the file after seeing this post. Please just don't click any files!

7 0
3 years ago
Read 2 more answers
Write a program in python to accept three numbers and print the largest of the three
Anika [276]

Answer:

num1 = int(input("Enter number 1: "))

num2 = int(input("Enter number 2: "))

num3 = int(input("Enter number 3: "))

print(max(num1,num2,num3))

Explanation:

Python 3

8 0
3 years ago
When was the GoPro camera invented?​
masya89 [10]

Answer:

2002

Explanation:

Please mark me brainliest :)

6 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
morpeh [17]

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

  • A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
  • An auditor can be defined as a program that is used to analyze the network.
  • The hacker can be a person who hacks the system to gain access or gather information.
4 0
4 years ago
Other questions:
  • Which of the following is an example of hypertext pattern reading?
    13·1 answer
  • In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.
    11·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • What is LINUX?
    6·2 answers
  • What are the names of different types of tablets<br>​
    13·1 answer
  • The RAND() function in Excel returns a pseudo-random number between 0 and 1. If you enter this function into 1000 cells (i.e. en
    5·1 answer
  • You upgrade a graphics workstation with a HyperThreading-enabled CPU core. You expect the programs on the desktop to run much fa
    12·1 answer
  • In two to three sentences, define "home row" and explain why it is important.
    6·2 answers
  • Which of the following is not a common input device?
    6·1 answer
  • What steps can you take to secure your private information?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!