1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
13

In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a

ttack packet. Will our attack succeed or fail
Computers and Technology
2 answers:
ale4655 [162]3 years ago
8 0

Answer:

Yes

Explanation:

The TCP communication between client and server is reliable, connection oriented and sequentially numbers transfered packets. The sequence number is used to rearrange packets at the destination since TCP protocol propagates packets on different channels, which would stop the sequential arrival of packets.

A destination in a TCP transmission would accept and store any packet with sequence number, before rearranging.

Irina18 [472]3 years ago
4 0

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

You might be interested in
Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
Len [333]

Answer:

white-hat hacker

Explanation:

The white-hat hacker is also called as ethical hacking. The white hat hacker is the security of the computer in an ethical manner by some experts it specializing in system testing and other test modules of computer is to ensure the security of the information security of an organization.

As Matt is a  developer for protecting the Cyber in a company The Matt creates secure management information systems. it divides the new task into the computer So Matt is a white-hat hacker in that organization

4 0
3 years ago
When James added a date field to a PivotTable, Excel grouped the date values into quarters, months, and years. He does not want
ivanzaharov [21]

When James clicks the Remove button on the PivotTable Tools Analyze tab is a true statement.

<h3>What is PivotTable?</h3>

A PivotTable is known to be a kind of interactive method that is used to quickly make a summary of large amounts of data.

Note that this table is one that a person can use to analyze numerical data thoroughly and it is known to be one that answer quick and unplanned questions about one's data.

Note that one can  remove the set date field without having any effect on the year or quarter fields.

Learn more about PivotTable from

brainly.com/question/15214258

7 0
2 years ago
"Write a class named Car that has the following data attributes:" _ _year_model (for the car’s year model) _ _make (for the make
UkoKoshka [18]

Answer:

public class Car {

   private String __year_model;

   private String __make;

   private int __speed;

   //Creating the constructor

   public Car(String __year_model, String __make, int __speed) {

       this.__year_model = __year_model;

       this.__make = __make;

       this.__speed = __speed;

   }

   //Creatining the set and get methods

   public String get__year_model() {

       return __year_model;

   }

   public void set__year_model(String __year_model) {

       this.__year_model = __year_model;

   }

   public String get__make() {

       return __make;

   }

   public void set__make(String __make) {

       this.__make = __make;

   }

   public int get__speed() {

       return __speed;

   }

   public void set__speed(int __speed) {

       this.__speed = __speed;

   }

}

Explanation:

As stated in the question, The class Car is created using Java programming language with the three attributes year_model, make and speed.

Constructors as well as set and get methods were also created for each of the fields.

6 0
3 years ago
What are the differences between Cc &amp; Bcc in emails that are sent ?​
Ket [755]

Cc stands for " carbon copy " and Bcc stands for " Blind carbon copy ". The difference between Cc and Bcc is that carbon copy (CC) recipients are visible to all other recipients whereas those who are BCCed are not visible to anyone.

8 0
3 years ago
Read 2 more answers
If you want the date in your document to update each time the document is opened, _____.
den301095 [7]
By clicking the update automatically<span> checkbox when inserting the date and/or time into a Word document... hope this helps!!!!</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • If a security officer is non-commissioned officer, he can carry a baton on duty if he went through a training class
    8·1 answer
  • In internet terminology, what is the term, .com, called?
    12·2 answers
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • 4. Write an appropriate comment for describ-
    11·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • An airline has found about 7% of its passengers request vegetarian meals. On a flight with 166 passengers the airline has 16 veg
    11·1 answer
  • 2. The Internet could best be described as: *
    12·1 answer
  • Pls help have absolutely no clue how to delete this
    12·2 answers
  • There is a surplus of scientific researchers for a vaccine. This means the demand for this career has
    8·2 answers
  • Which example best demonstrates an impact of computers on the economy?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!