1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
9

An attacker is intent on disturbing the communication by inserting bogus packets into the communications.

Computers and Technology
1 answer:
s2008m [1.1K]3 years ago
8 0

Answer:

A. No, it would not succeed.

B. Yes, the attack will succeed.

Explanation:

In the seven-layer OSI model of computer networking, packet strictly refers to a protocol data unit at layer 3, the network layer. So if an attacker wants to insert bogus/ fake packets this will happen at the network layer.

A. IPSec works on network layer (the IP layer) of the OSI model protecting and authenticating IP packets. It provides data integrity, authentication and confidentiality between participating peers at the IP layer.

Thus, inserting bogus packets into the communications by an attacker will not have any affect on security of a system which has IPSec security and therefore it will not succeed.

B. SSL/TLS is an application layer protocol that fits into layer 5 to 7 of the OSI model. However, an attack by inserting bogus packets into the communications will succeed as SSL only provides protection for layer 5 to 7 and not the network layer.

You might be interested in
Anne creates a web page and loads a CSS style script along with the page. However, the entire page appears black and she cannot
Drupady [299]

Answer: B. "She might have set backround-color in body to black in the CSS file"

Explanation: I took the test and got 100%

3 0
3 years ago
Which type of attack broadcasts a network request to multiple computers but changes the address from which the request came to t
aivan3 [116]

Answer:

Smurf attack

Explanation:

In smurf attack is an attack of DDoS type, i.e., Distributed Denial of Service where a network request is broadcast to multiple systems but return IP address of the system sending the request is forged with the victim's IP address.

It is that type of DDoS attack where the Victim's system is flooded with spoofed ping packets. It left the system inoperable and is done by exploiting the Internet Control Message Protocol and IP of the system which is dangerous for both the sending end system and the victim's system.

8 0
3 years ago
A network admin configures a static route on the edge router of a network to assign a gateway of last resort (the router that co
kupik [55]

Answer:

Use the default-information originate command.

Explanation:

A network administrator customizes a fixed path on a channel's edge router for creating any last recourse gateway that is the router connecting to the online / ISP. So, they using the usual command source to customize the edge router to connect this path instantly using RIP.

That's why the following answer is correct according to the scenario.

8 0
3 years ago
The method __________ sets the font (helvetica, 20-point bold) in component
Stolb23 [73]
The method d) c.setFont(new Font("Helvetica", Font.BOLD, 20)) sets the font (Helvetica, 20­point bold) in component C. A set of instructions that can be called for execution using the method name is a method in Java that can take in data or parameters and return a value - both parameters and return values are optional.
7 0
3 years ago
The product of two integers is -180 if one of them is 12 find the other​
astraxan [27]

The answer is -15. This because 12 * 15 = 180 so in order to make it negative one of the integers has to be negative and since 12 is given you have to make 15 negative.

6 0
3 years ago
Other questions:
  • Do all accounts use the same routing number
    12·1 answer
  • What are the three types of network topologies used today?
    13·1 answer
  • ____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.
    12·1 answer
  • Choose the correct statement about the UNIX family of operating systems:
    7·1 answer
  • Colin is a software developer. He would like to earn a credential that demonstrates to employers that he is well educated on sof
    15·1 answer
  • Which of the following best describes the existence of undecidable problems? *
    6·1 answer
  • What is typescript can you please give me a description of what it is
    13·1 answer
  • Need answer ASAP!!!!
    7·1 answer
  • 1. If we want define style for an unique element, then which css selector will
    14·1 answer
  • Your college has several campuses located across the city. within each campus, the buildings are interconnected with a campus ar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!