1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
13

In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a

ttack packet. Will our attack succeed or fail
Computers and Technology
2 answers:
ale4655 [162]3 years ago
8 0

Answer:

Yes

Explanation:

The TCP communication between client and server is reliable, connection oriented and sequentially numbers transfered packets. The sequence number is used to rearrange packets at the destination since TCP protocol propagates packets on different channels, which would stop the sequential arrival of packets.

A destination in a TCP transmission would accept and store any packet with sequence number, before rearranging.

Irina18 [472]3 years ago
4 0

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

You might be interested in
You are a cleared employee. Your friend called and told you that he saw information about the classified XYZ program on the Inte
m_a_m_a [10]

Answer:

Yes, because though you are a cleared employee, the classified information should not be open for all employees to see as it is a data disclosure violation.

Explanation:

Data is a vital tool in the business industry. The need to secure data or present it to be seen by competitors is very crucial as it maintains the dominance of a company on its competitors.

Only authorized employees in a company are allowed to view classified data and must report any siting of data spill, to avoid prosecution.

3 0
3 years ago
Which is better intel or amd real debate.
natima [27]

I believe Intel is better at handling games. Not saying AMD isn't good, just not as good. AMD is better for handling multiple task. I personally don't mind either.

8 0
3 years ago
Read 2 more answers
If I wanna records a game and my voice need to be in the video what app I download.
saveliy_v [14]
<span>Video Editor & Movie Maker App</span>
8 0
4 years ago
Read 2 more answers
Which of the following functions needed to implement the information security program evaluates patches used to close software v
solong [7]

Answer:

a. Systems testing

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being defined is called System Testing. Like mentioned in the question, this is a technique used in order to evaluate the complete system the system's compliance against specified requirements, which tests its functionalities from an end-to-end perspective in order to evaluates patches used to close software vulnerabilities and make sure it complies with all policies.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Where are some places that cyberbullying occurs? check all that apply
antiseptic1488 [7]

Answer:

social media like  snap chat twitter  and face book .it can even happen over email.or in school chats.

Explanation:

5 0
4 years ago
Read 2 more answers
Other questions:
  • What attributes a website indicates a more reliable source for information
    14·1 answer
  • Suppose you have two arrays of ints, arr1 and arr2, each containing ints that are sorted in ascending order. Write a static meth
    7·1 answer
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • Some careers emerge to address the environmental impact human behaviors and processes might be having on our planet. True False
    9·2 answers
  • An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove
    13·1 answer
  • What kind of sampling does a quasi experiment use?
    11·1 answer
  • Does anyone know how to fix this? Everytime i make a new page it only types in the middle of the page. I want to type at the top
    11·1 answer
  • The way that a writer displays their personality and imagination on the page is called:
    13·1 answer
  • Hannah wanted to watch a movie. She typed the movie name on the search engine. In result she found the downloadable link of the
    10·1 answer
  • Complete the following sentence.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!