1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Thepotemich [5.8K]
3 years ago
10

As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them.

Which type of attack uses more than one computer to attack the victim?
Computers and Technology
1 answer:
Aliun [14]3 years ago
5 0

Answer:

The answer is "DDoS "

Explanation:

The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.

  • This attack is aimed to avoid legal customers of one's website from accessing it.  
  • In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.  
  • One other way to successfully attack is to send fake requests from the attacker.
You might be interested in
How is steering different from turning ? Need help //:
kotykmax [81]

Turning you go make a turn steering is where you keep yourself on the road.

6 0
3 years ago
All of the following are true about data science and big data except: a.Digital data is growing at the rate of 2.5 quintillion b
Firlakuza [10]

Answer:

Option C

Explanation:

All of the following are true about data science and big data except No digital data is stored in traditional databases

Reason -

Data generated in current time is of large size and is also complicated. Traditional data bases such as SQL databases etc. are not capable to store  data that is changing at a fast pace and has huge volume, veracity, variety and velocity. But big data platforms such as Hadoop can store big data and process it speedily and easily.

3 0
3 years ago
What consist(s) of a series of related instructions that tells the computer what to do and how to do it
Ber [7]

Answer:

Software program.

Explanation:

Unlike hardware which describes physical entities of a computer, a software program or simply a program (or even simply, a software) is a set of instructions or data that commands the computer on specific tasks to be performed and how they (the tasks) are performed.  Examples of a software are internet browser applications such as Google Chrome, Internet Explorer, and Mozilla Firefox and graphics applications such as Photoshop and Corel Draw.

Hope this helps!

8 0
4 years ago
Describe the steps to play a presentation the way your audience will see it. A)Go to the View tab and select Editing View. B)Go
Sonbull [250]

C) Go to the View tab and select Slide Show.

Explanation:

Steps for Slide Show View to Deliver a Presentation:

  • Go to the Slide Show view from the Task bar at the bottom of the slide window.
  • Use the Slide Show view to deliver your presentation to your audience.
  • Slide Show view occupies the full computer screen.

5 0
3 years ago
When a program lets the user know that an invalid menu choice has been made, this is an example of?
kolezko [41]

The question has the multiple choices below

A) Input validation
B) output correction
C) compiler criticism
D) output validation

The answer is (A) Input validation

Also known as data validation, it is the correct and proper testing of any input supplied by an application or a user. It prevents wrongly formed data from entering the system. Applications should be able to check and validate every input entered into the system since it is hard to detect a malicious user trying to gain entry into software.










5 0
4 years ago
Other questions:
  • How many bones are in a human body
    7·2 answers
  • Which of the following is a valid format symbol in Microsoft Excel? Dollar Sign, Comma, Percent Sign or all of them? I can't fig
    14·1 answer
  • Users generally do not understand the concept of network drive sharing. they only know they can store their files "on my f: driv
    8·1 answer
  • Why do i have to wait and watch videos
    11·1 answer
  • my pc wants to run the highest graphics even though I restart it everyday and it gets around 10 fps and I have a 1080 Nvidia gra
    7·1 answer
  • When a cells number format is “time” it will show a value in what format
    5·1 answer
  • What is the smallest amount of information called?
    13·2 answers
  • What tool is used to edit pre-existing range names? (check all that apply)?
    10·1 answer
  • What techniques are required to accept
    12·1 answer
  • A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are take
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!