1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
2 years ago
10

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.

Which type of attack uses more than one computer to attack the victim?
Computers and Technology
1 answer:
Aliun [14]2 years ago
5 0

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
You might be interested in
What is the meaning of 4 8 15 16 23 42?
Delicious77 [7]
The Numbers. ...The numbers 4<span>, </span>8<span>, </span>15<span>, </span>16<span>, </span>23<span> and </span>42<span> frequently recurred in Lost. Each corresponded with one of the final candidates to replace Jacob as protector of the Island. The numbers also formed the coefficients in an equation that predicted mankind's extinction.</span>
5 0
3 years ago
A _____ captures the pattern in a _____ and sends it to the computer, where special software translates the _____ into meaningfu
g100num [7]

Answer:

A bar code reader scanner captures the pattern in a barcode and sends it to the computer, where special software translates the pattern into meaningful data.

Explanation:

A barcode reader is a handheld device that captures and reads information that is contained in a bar code. It consists of a scanner, a decoder and a cable that connects the barcode reader into a computer. This scanner works by directing a beam or red light across the black and white elements of a barcode. This amount of light energy that is reflected back is measured and converted into electrical energy which is then converted into readable data by the decoder and forwarded to a computer.

4 0
3 years ago
________ is interpreted. Group of answer choices A. Python B. C C. C D. Ada E. Pascal
rusak2 [61]

The interpreted are;

  • A. Java
  • B. C++
  • D. C#
<h3>What is interpreted programming language?</h3>

An interpreted language is known to be a kind of languagewhere its implementations often carry out or execute instructions directly.

Note that The interpreted are;

  • A. Java
  • B. C++
  • D. C#

Learn more about Java from

brainly.com/question/25458754

#SPJ11

7 0
2 years ago
Point out the correct statement.
NeTakaya

Answer:

Option D is correct.

Explanation:

Cassandra labeling information with such a gravestone indicates should restart transmitting an erase request to such a duplicate that had been down earlier of deletion.

Cassandra may not instantly delete information labeled for removal from disc the removal of identified information takes place throughout compaction a deleted section may reappear when a maintenance is never regularly carried out.

4 0
2 years ago
Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
disa [49]

Answer:

Sandboxing.

Explanation:

SDLC or software development life cycle is a systematic approach to software development. It marks the birth and death of an application.

The application development starts from the research of the properties of the application to the design and development or implementation of the application.

After the implementation of the software, it is tested, comparing the design and the codes in the development process. The sandboxing testing process helps to isolate and test new lines of code added during the testing phase.

3 0
3 years ago
Other questions:
  • How many bytes of information can be stored on a hard drive?
    7·1 answer
  • If a table is designed so that every determinant is a candidate key, then that relation is in ________.
    14·1 answer
  • Name similarities between innovation and invention
    6·1 answer
  • What is information associated with a document to help describe that document called?
    12·1 answer
  • For each 8-bit data frame the layer uses a generator polynomial G(x) = x4+x2+ x+1 to add redundant bits. What is the sequence of
    11·1 answer
  • Excel spread sheets are primarily used to
    13·2 answers
  • Questions Presscomion
    9·1 answer
  • When adjusting the aperture, an F-stop of F32 lets in more light then a setting of F8
    10·1 answer
  • Alfred works in the human resources department, and he uses a management information system to find applicants' résumés on the w
    7·1 answer
  • Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!