1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
13

In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a

ttack packet. Will our attack succeed or fail
Computers and Technology
2 answers:
ale4655 [162]3 years ago
8 0

Answer:

Yes

Explanation:

The TCP communication between client and server is reliable, connection oriented and sequentially numbers transfered packets. The sequence number is used to rearrange packets at the destination since TCP protocol propagates packets on different channels, which would stop the sequential arrival of packets.

A destination in a TCP transmission would accept and store any packet with sequence number, before rearranging.

Irina18 [472]3 years ago
4 0

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

You might be interested in
New cars come with an onboard computer that controls anti-lock brakes, air bag deployment, fuel injection, etc. the software is
nika2105 [10]
Electronic control unit (ECU)is a general term for any of a number of computer modules that receive input from sensors in your automobile and control different electrical functions

The ECM is basically an on-board computer in your car it is the most common

On-board diagnostics (OBD) is an automotive term referring to a vehicle's self-diagnostic and reporting capability. 

ABS controls anti lock breaks
6 0
4 years ago
Read 2 more answers
Define a function below called average_num_in_file. The function takes one argument: the name of a file full of numbers. Complet
Nookie1986 [14]

Answer:

  1. def average_num_in_file(fileName):
  2.    with open(fileName) as file:
  3.        rows = file.readlines()
  4.        sum = 0
  5.        count = 0
  6.        for x in rows:
  7.            sum += float(x)  
  8.            count += 1
  9.        average = sum / count  
  10.    return average  
  11. print(average_num_in_file("cans.txt"))

Explanation:

The solution code is written in Python 3.

Firstly create a function that take one parameter, fileName (Line 1).

Open the file stream and use readlines method to read the data from the file (Line 2-3). Create variable sum and count to tract the total of the number from text files and number of data from the file (Line 5-6). Use a for loop to loop over each row of the read data and add the current value of each row to sum and increment the count by one (Line 7-9).

After the loop, calculate the average (Line 11) and return the result (Line 12).

At last, we can test the function by passing the cans.txt as argument (Line 14).

7 0
4 years ago
Is it possible for the front and rear references in a linked implementation to be equal?
Mamont248 [21]

Answer:

Yes

Explanation:

Linked list is a data structure where we can insert any element or update ,delete elements very easily by updating the links.no shift operations are required like in arrays. Efficient data structure for data modification.

In linked list front always points to the starting of the list and rear always points to the last element of the list. In case of circular linked list rear and front points to the same reference. In circular linked list next element of the last element refers to the first element.in this scenario it is possible for the front and rear references to be equal.

4 0
4 years ago
During Globalization 2.0, there was a huge overinvestment in: Question 10 options: 1) telecommunications infrastructure 2) compu
Amiraneli [1.4K]

Answer: 1) telecommunications infrastructure

Explanation:

Globalization 2.0 came after the second world war at a time where the world was yarning for opportunities that would connect it better.

They turned to telecommunications infrastructure and invested heavily into it to carry messages from one part of the globe to the other. This led to a fall in telecommunications cost and a rise in new technologies like the mobile phone.

4 0
3 years ago
Hilda is troubleshooting a problem with the encryption of data. at which layer of the osi reference model is she working?
Fittoniya [83]
The la<span>yer of the osi reference model that hilda is currently working on is: presentation
On Osi reference model, the presentation layer is created </span><span>to take care of the semantics and syntax of the information exchanged between two systems. The presentation layer will make sure that the receiver of the information will understand the data that being given.</span>
7 0
3 years ago
Other questions:
  • A company's computers monitor assembly lines and equipment using ________ communications.
    6·1 answer
  • Suppose you define a java class as follows: public class test { } in order to compile this program, the source code should be st
    14·1 answer
  • What is the computer's main memory, which consists of the random access memory (ram), cache memory, and read-only memory (rom) t
    12·1 answer
  • After your yearly checkup, the doctor has bad news and good news. The bad news is that you tested positive for a serious disease
    9·1 answer
  • You want to get information about DNS request types and DNS query packet content. What kind of DNS logging do you need to enable
    13·1 answer
  • Match the different stages of boot sequence with the order in which they occur.​
    15·2 answers
  • Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2
    11·2 answers
  • Use______ to format cells when they meet a certain criteria.
    13·1 answer
  • What are the differences between switches and routers? cse question
    8·1 answer
  • How do i delete a question ?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!