1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dusya [7]
3 years ago
8

Using the Web or another research tool, search for alternative means of defending against either general DoS attacks or a partic

ular type of DoSattack. This should be any defense other than the ones already mentioned in Chapter 4. Write one-page summary regarding your found defense techniques (at least two techniques). You are required to cite all your references that you used to write the summary. Your answer should include the following information for each of the alternative defending approaches:
Computers and Technology
1 answer:
Thepotemich [5.8K]3 years ago
7 0

Answer and Explanation:

DOS attacks refer to Denial of Service attack. It is a sort of digital attack where a programmer hacks the system of a framework and makes it inaccessible for the clients which results in intruding on the internet providers of the machine.  

At the end of the day, access to online administrations is denied for the client. Any sort of system administration can be upset by DOS assaults be it either bank site or an online business site.

Following is one of the defense techniques against DOS attacks:

Using Routers and Firewalls - As switches have rate constraining and access control capacities, so they can be set up in a legitimate manner to stop basic ping assaults by permeating unessential conventions and can likewise stop invalid IP addresses. In any case, the main hindrance for utilizing switches is that they are usually ineffective against an increasingly advanced parodied assault and application-level assaults utilizing substantial IP addresses. Presently here comes the job of firewalls. Firewalls can ensure the system by dismissing all the traffic landing from aggressor's end. This insurance by firewalls depends on basic principles dependent on conventions, ports or the starting IP addresses.  

Be that as it may, it is difficult to hinder some mind boggling assaults by these straightforward standards. For instance, if there is a progressing assault on port 80 (web administration), it is beyond the realm of imagination to expect to drop all approaching traffic on this port in light of the fact that doing so will keep the server from serving genuine traffic.  

One detriment of firewall is that Firewalls can close down a particular stream related with an assault, however like switches, they can't perform hostile to ridiculing.

You might be interested in
Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet c
VashaNatasha [74]

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

5 0
2 years ago
Which building-block feature is available in the Text grouping on the Insert tab?
saveliy_v [14]

Answer:

Business information

Explanation:

The building blocks are durable objects for content like corporate material, headings, timetables, and gallery advertising. The user can retrieve and utilize the building blocks at any time. The user can also design, saves, categorize and enter a description of their own building blocks, and tag them with keywords to help them find easily. 

Business information is one of the main features of the building block galleries that is found on the insert tab in text group.

3 0
3 years ago
My current lesson is The Excel Screen and Worksheets and the question is:
Usimov [2.4K]
I can't tell you the answer without a picture, but to find the answer yourself: Go straight up from the cell containing 'Activity Questions' this will tell you a letter such as B. Go directly across to the left of the cell containing 'Activity Questions' this will tell you a number such as 3. The name of the cell I used as an example would be called B3.
3 0
3 years ago
What is the name given to software that decodes information from a digital file so that a media player can display the file? har
KiRa [710]

Answer:

plug-in

Explanation:

A Plug-in is a software that provides additional functionalities to existing programs. The need for them stems from the fact that users might want additional features or functions that were not available in the original program. Digital audio, video, and web browsers use plug-ins to update the already existing programs or to display audio/video through a media file. Plug-ins save the users of the stress of having to wait till a new product with the functionality that they want is produced.

6 0
2 years ago
What is the difference between concrete language and abstract language? give an example of each.
saul85 [17]

The difference between abstract language and abstract language is that abstract language is known through the intellect and concrete language is known through the senses.

<h3>What are abstract and concrete languages?</h3>

The abstract language uses the words like kind, truth, grace, etc. It is a form of language that indicates the intellectual, but concrete language can be known by the senses.

Thus, the distinction between concrete and abstract language is that concrete language is understood via the senses, whereas abstract language is understood through the mind.

To learn more about abstract and concrete languages, refer to the link:

brainly.com/question/16550006

#SPJ4

7 0
1 year ago
Other questions:
  • SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
    11·1 answer
  • Harry Potter and his friends are at Ollivander's with Ron, finally replacing Charlie's old broken wand. Hermione decides the bes
    11·1 answer
  • If Tracy starts on the left edge of the canvas and moves forward 50 pixels, how many times will this code need to be repeated to
    5·1 answer
  • What are two variables is figure 1 comparing
    10·1 answer
  • Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
    8·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • A disciplined, creative, and effective approach to problem solving is needed for project success. The nine-step approach to prob
    13·1 answer
  • Do u have to divide or multiply this problem 5300 yd = mi
    9·1 answer
  • What steps should be taken to dispose of and recycle plastic?
    14·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!