1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
3 years ago
15

63:47 One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malfor

med segments. Which Transmission Control Protocol (TCP) flag will be used? SYN PSH RST FIN
Computers and Technology
1 answer:
vovangra [49]3 years ago
7 0

Answer:

RST

Explanation:

What is RST TCP?

In a stream of packets of a TCP connection, each packet contains a TCP header. Each of these headers contains a bit known as the "reset" (RST) flag. ... One common application is the scenario where a computer (computer A) crashes while a TCP connection is in progress.

Why TCP RST is sent?

RST is sent by the side doing the active close because it is the side which sends the last ACK. So if it receives FIN from the side doing the passive close in a wrong state, it sends a RST packet which indicates other side that an error has occured.

You might be interested in
A news report says that company XYZ network was attacked by outsiders, who apparently sent a lot of spoofed ARP requests/respons
GaryK [48]

Answer:

False

Explanation:

Mac address a physical addresses of digital devices, hard-coded to the communication interface as a unique identifier.

ARP or address resolution protocol is a layer 2 protocol used by switches to determine the MAC address of host devices by send a broadcast message through all ports in the switch.

ARP spoofing attack is done within a network, whereby an attacker changes the Mac address to receive data meant for another target host. With this, a remote access to the switch is used to establish an ARP cache poisoning attack.

4 0
3 years ago
HELP ASAP
CaHeK987 [17]
The answer is B, e commerce. Have a good day
3 0
3 years ago
What is the binary number system? ​
Scilla [17]
DescriptionIn mathematics and digital electronics, a binary number is a number expressed in the base-2 numeral system or binary numeral system, which uses only two symbols: typically "0" and "1". The base-2 numeral system is a positional notation with a radix of 2. Each digit is referred to as a bit.
6 0
3 years ago
The helping professions all involve_____.
NARA [144]

Answer:

look that up on gogle

filler filler filler filler filler

7 0
3 years ago
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
Other questions:
  • What percentage of U.S. households own a gaming console that is less than two years old?
    13·2 answers
  • Which best describes a computer bug? A piece of computer hardware that is out of date or has a newer version a piece of computer
    14·2 answers
  • if your computer is frozen, what is something you would do to troubleshoot the problem? A. check if the monitor is plugged in B.
    15·2 answers
  • In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
    7·1 answer
  • How can development in ICT be utilized to speed up the development and integration efforts
    5·1 answer
  • Which hypervisor works on older pcs without hardware virtualization support?
    9·2 answers
  • The name of a Variable effects its value<br><br> True<br><br> False
    7·1 answer
  • What does the somaliland high population density <br>​
    15·1 answer
  • Another name for the office button menu is the toolbar. true or false.
    7·2 answers
  • Which tool should be used to verify the compatibility of an application run on Windows 10?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!