1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
10

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.

Which type of attack uses more than one computer to attack the victim?
Computers and Technology
1 answer:
Aliun [14]3 years ago
5 0

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
You might be interested in
during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
icang [17]
Idk just need points
6 0
3 years ago
A thesaurus is an example of a(n)
Ivahew [28]

Answer:

D. online reference

Explanation:

An "online reference" refers to a<em> digital reference</em> that end users may utilize for their work or other daily activities. For example, if a person is looking for the <em>synonym of a particular word,</em> she may then refer to the thesaurus.

A blog is a website where you can find personal journals from different writers.

An e-book is an <em>"electronic book."</em> This allows people to read book digitally.

An e-zine is an<em> "electronic magazine." </em>This is a magazine in its digital form.

3 0
3 years ago
Read 2 more answers
When using straight ladder ,the base of the ladder should be___away from the wall
dusya [7]
It should be angled away from the wall like |\
3 0
3 years ago
Write a Dice Game program that generates two random dice values between 1 and 6 for you, and 2 for the computer. You get to roll
charle [14.2K]

Answer:

#include <iostream>

#include <time.h>

#include <string>

using namespace std;

int main(){

srand(time(NULL));

cout<<"Throw dice"<<endl;

int b =0;

int a=0;

a=rand()%6;

b=rand()%6;

for (int i =0;i<1;i++)

{cout<<"dice one: "<<a<<endl;}

for (int i =0;i<1;i++)

{cout<<"dice two: "<<b<<endl;}

if(a>b)

{cout<<"first dice won"<<endl;}

if(b>a)

{cout<<"second dice won"<<endl;}

else{cout<<"they are same"<<endl;

return main();

}

return 0;

}

Explanation:

/*maybe it help you it is almost done*/

6 0
3 years ago
What is the MOST important precaution to take when using social networking sites like Facebook? Use discretion Monitor friend re
leonid [27]
Uh, sure having a strong password is always nice. However, a passphrase is far superior. An example would be: My57goatsequals[4log]. Google Edward Snowden, and all your questions will be answered (concerning privacy). Oh, and by the way, use a VPN (Virtual Private Network) whenever possible.
8 0
3 years ago
Other questions:
  • How does a 3D CAD solid model program display the progression of work involved in creating a model?
    5·1 answer
  • Why is monitoring email, voice mail, and computer files considered legal?
    6·1 answer
  • Which of the following tasks requires software? A Writing a paper on the history of Aztec sun godsB Creating a photo collage for
    9·1 answer
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the docum
    9·1 answer
  • Choose all items that represent features of the job application process
    8·1 answer
  • Why concurrency control is needed in transaction.
    5·1 answer
  • What solicits online input such as product ratings from consumers?
    7·1 answer
  • When should students practice netiquette in an online course? Check all that apply.
    9·1 answer
  • What three actions happen when you cloak a folder or file?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!