1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
10

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.

Which type of attack uses more than one computer to attack the victim?
Computers and Technology
1 answer:
Aliun [14]3 years ago
5 0

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
You might be interested in
Why is it important to ground both computers and network devices?
julia-pushkina [17]

Answer:

Ground the electrical equiptment so no power surges come through and fry the equiptment if there is a storm etc.

Explanation:

4 0
2 years ago
__________ has remained a dominant communication tool, despite the rise in use of newer, alternative media options for message d
maksim [4K]

Answer: E-mails

Explanation:

 An E-mails is one of the type of digital message and also known as the dominant communication tool which is used for in the form of document in an organization where we can used it in different ways are as follows:

  • Communicating with other employees related to rules and regulations of an organization
  • Making various types of recommendations
  • Used for an inquiry purpose
  • providing various types of current status and new updates

According to the given question, Emails is one of the type of tool that is used as the communication medium and it is one of the flexible message delivery options which is widely used by an organizations.

 

6 0
3 years ago
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
Technology that is attached to a tag and used to identify postal packages is a(n) _____.
Dmitry [639]
Technology that is attached to a tag and used to identify postal packages is a(n) RFID.
__________________________________________________________

RFID:  Radio-Frequency Identification

6 0
3 years ago
Read 2 more answers
If you need to determine impacts on revenue resulting from an increase or
Andrew [12]

Answer: B. Spreadsheet

Explanation:

In order to assess the impact from an increase or decrease in price and / or sales , is more useful to use an spreadsheet, because, even though it store values in cells, in the same way that a database could do in fields , the spreadsheet can link the values with more flexibility, using different formulae, trying different scenarios, 'what if" type questions, etcetera, not so easy to do with databases.

4 0
3 years ago
Other questions:
  • When issued a GFE device, you are required to sign an AUP
    12·2 answers
  • Why were mechanical calculators developed?
    8·2 answers
  • In Microsoft Word you can access the _______ command from the "Mini toolbar
    11·1 answer
  • When a block of steel at 90 degrees Celsius is placed in a bucket of water at 30 degrees Celsius, what happens?
    10·1 answer
  • Which of the following statements best summarizes the principles behind the efficient use of the Internet for research? Know wha
    12·1 answer
  • Each Google My Business location has a unique ID that applies changes to the right listing.
    11·1 answer
  • I am a bacterium. I cause stomach cramps and diarrhea. I am caused by eating rotten foods
    7·2 answers
  • To use
    11·1 answer
  • What do you consider to be audit evaluation areas?
    14·1 answer
  • Do laws ever change to help enforce cyber hacking crimes
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!