1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Diano4ka-milaya [45]
3 years ago
13

An attacker on the network intends to overwhelm another computer with icmp packets as follows:

Computers and Technology
1 answer:
Blizzard [7]3 years ago
4 0
And, the simple answer is to disable ICMP echo requests on either the router or Workstation.
You might be interested in
What are the challenges of Cyber Law???? Needed ASAP ​
lilavasa [31]

Answer:

Explanation:

Few challenges that the technology space faces in cyber security are the following:

Digital Data Threat: Growing online transactions generate bigger incentives for cybercriminals. Besides, establishments looking to mine data—for instance, customer information, results of product surveys, and generic market information—create treasured intellectual property that is in itself an attractive target.

Supply Chain Inter-connection: The supply chains are increasingly interconnected. Companies are urging vendors and customers to join their networks. This makes a company’s security wall thin.

Hacking: This action is penetrating into someone’s system in unauthorized fashion to steal or destroy data, which has grown hundred folds in the past few years. The availability of information online makes it easier for even non-technical people to perform hacking.

Phishing: The easiest to execute and can produce the results with very little effort. It is the act of sending out Fake emails, text messages and create websites to look like they're from authentic companies.

6 0
2 years ago
1. Which of the following is not related to a buffer overflow? A. Static buffer overflow B. Index error C. Canonicalization erro
GaryK [48]

Answer: C) Canonicalization error

Explanation:

Canonicalization error is the error or fault that occurs when data is changed into canonical form or standard form that persist different representation.This can create fault when different filenames or structure is assigned to data and canonization cannot take place as it works for simple data representation.

  • Other options are incorrect because static buffer flow is stable writing or reading of data that reaches outside the buffer boundary.Index error is accessing of index by any user that is found beyond the index's list boundary.
  • Heap overflow is the stack gets overlowed outside the boundary while overwriting heap.Thus, the correct option is option(C).
4 0
2 years ago
Computers rarely make mistakes. True or false
Angelina_Jolie [31]

Answer: False, everything makes mistakes, even technology.

Explanation: It's not rare for a computer to slip up and glitch. All you need to do is troubleshoot it. Hope this helps :)

3 0
1 year ago
Why hackers hack?? in other people?​
pshichka [43]
Could you please reword this question. i don’t get what you’re asking
8 0
3 years ago
Read 2 more answers
What is the function of tab?<br>​
Sholpan [36]

Answer:

The function of the tab is used to advance the cursor to the next tab key.

5 0
1 year ago
Other questions:
  • What three components make up a film camera?
    14·2 answers
  • Binary is a sequence of 0s and 1s such as 1001101 which can be used to code information. To break a code, you need to find how m
    14·1 answer
  • The section called Breaking Substitution Ciphers (p. 166) describes a "random substitution cipher," in which each letter of the
    11·1 answer
  • The ability to learn a new computer software program is to ____________ as knowledge of state capitals is to _____________.
    11·1 answer
  • How does this app work?
    11·2 answers
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • A computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a ser
    9·1 answer
  • What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?
    13·1 answer
  • Explain what an IM is, and what is the technology shown in the accompanying figure
    7·2 answers
  • 5. Nadia wants to calculate the total interest, which is the total amount of the payments minus the loan amount. In cell F6, ent
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!