1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
3 years ago
7

A ________________ uses multiple systems to attack one or more victim systems or websites with the intent of denying service to

legitimate users wishing to log on or utilize the attacked server.
1. Worms
2. Viruses
3. Trojan
4. Denial-of-Service attacks
Computers and Technology
1 answer:
Advocard [28]3 years ago
6 0

Answer:

4. A Denial of Service attack (DDOS attack).

Explanation:

A DDOS attack is a malicious attempt to disrupt the normal traffic to a service.

In essence, it sends an enormous amount of requests to the service, until the server is overwhelmed because it can't handle that much traffic, and collapses in an overflow.

Thus, regular users are not able to access their services.

Usually, attackers use a botnet, a network of "zombie" computers that have been previously infected with a malware that allows the attacker to remotely control them, then the botnet starts to send a flood of traffic from different locations, and make the attacker difficult to detect or track.

You might be interested in
If you are feeling sick and you want to drive somewhere, you should
Ganezh [65]

Answer

Ask someone to drive you.

Explanation

When feeling ill, or even taking medication before driving Is dangerous for the driver and other road users  because it slows reactions and the ability to make rapid corrective actions while driving. Driving while sick  can also have the same effects on a driver as if they were drinking.

5 0
3 years ago
Read 2 more answers
) Consider a router that interconnects four subnets: Subnet 1, Subnet 2, Subnet 3 and Subnet 4. Suppose all of the interfaces in
erik [133]

Answer:

Check the explanation

Explanation:

223.1.17/24 indicates that out of 32-bits of IP address 24 bits have been assigned as subnet part and 8 bits for host id.

The binary representation of 223.1.17 is 11011111 00000001 00010001 00000000

Given that, subnet 1 has 63 interfaces. To represent 63 interfaces, we need 6 bits (64 = 26)

So its addresses can be from 223.1.17.0/26 to 223.1.17.62/26

Subnet 2 has 95 interfaces. 95 interfaces can be accommodated using 7 bits up to 127 host addresses can represented using 7 bits (127 = 27)

and hence, the addresses may be from 223.1.17.63/25 to 223.1.17.157/25

Subnet 3 has 16 interfaces. 4 bits are needed for 16 interfaces (16 = 24)

So the network addresses may range from 223.1.17.158/28 to 223.1.17.173/28

4 0
3 years ago
A computer game that can be purchased online and played right away has good _____ utility.
ratelena [41]
D. Time

It’s easy to access any time even after it was just purchased.

I hope this helped
6 0
3 years ago
Discuss your role as an IT professional in terms of your responsibility to clients, co-workers and society.
Tom [10]

An IT professional is expected to deliver correct installations and programming that are safe from security breaches to clients. To co-workers, teamwork, respect, and brainstorming are needed to work together and achieve results. To society, an IT professional is expected to deliver architectures that do not compromise security and privacy.

An information technology professional could be focused on the hardware or software of systems. It is vital that IT professionals deliver services that are foolproof and not susceptible to attacks.

When working with colleagues, they must cooperate in order to deliver the most efficient services.

Learn more about IT professionals here:

brainly.com/question/14314381

8 0
2 years ago
Why is hard disk called random access medium​
Effectus [21]

Answer:

Data is accessed in a random-access manner, meaning the individual blocks of data can be stored and retrieved in any given order or time.

Explanation:

5 0
1 year ago
Read 2 more answers
Other questions:
  • List 7 internal components in a computer system
    8·2 answers
  • The publisher tab in the application control allows you to manage the various certificates that are used to do what to binaries?
    8·1 answer
  • You will be given a string, containing both uppercase and lowercase alphabets(numbers are not allowed).
    14·1 answer
  • In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
    8·1 answer
  • Ayudaa, 5 ejes de sistemas tecnológicos
    5·1 answer
  • All of these valid ways to earn money in microworkers except
    8·1 answer
  • What are price comparison websites?
    6·1 answer
  • How to turn off location on iphone without person knowing
    15·1 answer
  • Draw a flowchart that solve the problem of calculating the average of 5 numbers.
    7·1 answer
  • Which of the following was the first computer-animated film to win animated film to win an academy award?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!