1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
9

An attacker is intent on disturbing the communication by inserting bogus packets into the communications.

Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
8 0

Answer:

A. No, it would not succeed.

B. Yes, the attack will succeed.

Explanation:

In the seven-layer OSI model of computer networking, packet strictly refers to a protocol data unit at layer 3, the network layer. So if an attacker wants to insert bogus/ fake packets this will happen at the network layer.

A. IPSec works on network layer (the IP layer) of the OSI model protecting and authenticating IP packets. It provides data integrity, authentication and confidentiality between participating peers at the IP layer.

Thus, inserting bogus packets into the communications by an attacker will not have any affect on security of a system which has IPSec security and therefore it will not succeed.

B. SSL/TLS is an application layer protocol that fits into layer 5 to 7 of the OSI model. However, an attack by inserting bogus packets into the communications will succeed as SSL only provides protection for layer 5 to 7 and not the network layer.

You might be interested in
How a student can use computer to improve academic performance?
nikdorinn [45]

Answer:

k Nishant

Explanation:

he can learn many things internet by using computer he change his self by learning about many things

3 0
3 years ago
Read 2 more answers
What type of software repairs or improves a larger application that is already installed on a system?
earnstyle [38]

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
7 0
3 years ago
Read 2 more answers
How can you quickly locate emails with large attachments.
IgorC [24]

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

<h3>How do I find emails by attachment size?</h3>

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

brainly.com/question/978078

4 0
2 years ago
1 punto
masya89 [10]

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

4 0
3 years ago
Convert the following as indicated : (120)10 = (?)2​
Nookie1986 [14]

Answer:

1111000

Explanation:

perform the following. write from right to left:

- is the number even? then write down a 0

- is the number odd? then write down a 1 and subtract 1

- divide by 2

- repeat until you reach 0.

So for 120:

120 is even, so write down a 0 and continue with 120/2=60

60 is even,  so write down a 0 and continue with 60/2=30

30 is even,  so write down a 0 and continue with 30/2=15

15 is odd,  so write down a 1 and continue with 14/2=7

7 is odd, so write down a 1 and continue with 6/2=3

3 is odd, so write down a 1 and continue with 2/2=1

1 is odd, so write down a 1 and finish with 0

4 0
3 years ago
Other questions:
  • Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.
    9·2 answers
  • .Although SQL is a language, you don’t use it to write applications? (true, false)
    8·1 answer
  • According to the Bureau of Labor Statistics, how
    14·1 answer
  • It is important for security practitioners to take into consideration the __________ element when devising password security pol
    15·1 answer
  • For each part create a vector n in which the first element is 1, the increment is 1 and the last term is 5, 50, or 5,000. Then u
    13·1 answer
  • Give one example of where augmented reality is used​
    11·2 answers
  • Always follow the routine "clean up while in use and clean up before keeping it".
    6·1 answer
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • Which graphic file format would you choose if you needed to make an animated graphic for a website?
    5·1 answer
  • Help me please. I dont really understand this.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!