1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
9

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag

es back to the computer that originated the suspected spam? Multiple Choice typosquatting teergrubing Internet censorship website name stealing
Computers and Technology
2 answers:
Burka [1]3 years ago
8 0

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

Aloiza [94]3 years ago
4 0

Answer:

teergrubing

Explanation:

The tern "teergrubing" was derived from the German term "tar pit." A teergrube is a process where the email system on a computer's main server is  intentionally set slow so that it can detect and sniff out potential spam attacks on the computer's email system. In addition, the system ensures that the email system is enabled to bounce off the emails from the spammers by identifying the pathway used to send the email. As soon as the email is labelled malicious, the email is immediatetl labelled "spam"or as potentially dangerous and is shifted to the spam folder or sent back quickly to the owner. as a rejected email.

You might be interested in
Who can help me with 50 varables on codeskulptor​
MrMuchimi

Answer:variables - placeholders for important values

# used to avoid recomputing values and to

# give values names that help reader understand code

# valid variable names - consists of letters, numbers, underscore (_)

# starts with letter or underscore

# case sensitive (capitalization matters)

# legal names - ninja, Ninja, n_i_n_j_a

# illegal names - 1337, 1337 ninja

# Python convention - multiple words joined by _

# legal names - elite_ninja, leet_ninja, ninja_1337

# illegal name 1337_ninja

# assign to variable name using single equal sign =

# (remember that double equals == is used to test equality)

# examples  

my_name = "Joe Warren"

print my_name

my_age = 51

print my_age

# birthday - add one

#my_age += 1

print my_age

# the story of the magic pill

magic_pill = 30

print my_age - magic_pill

my_grand_dad = 74

print my_grand_dad - 2 * magic_pill

Explanation:placeholders for important values. 2. # used to avoid recomputing values and to. 3. # give values names that help reader understand code. 4. ​. 5. ​.

6 0
3 years ago
What was one of the main purposes of the first computer systems?
wolverine [178]
<span>Financial transactions were one of the first purposes of computers. This is where "ticker tapes" came from; early computers were used to keep track of how stocks were performing. Computers in early days used large mainframe systems and punch cards to keep track of this type of data.</span>
6 0
4 years ago
Which one of the following items is an example of software?
Harlamova29_29 [7]
Word processing program is an example of a software. All the others, such as Printer, Keyboard and Mouse are examples of Computer peripheral devices or in short hardware devices. Generally these listed hardware devices come under input or output computer device category. Also, by classic meaning in layman terms these hardware components can be touched or felt. In contrast, a word processing program is a part of a computer system that consists of data or computing instructions and provides the mechanism to computer to perform a certain task utilizing it's hardware resources. Such components of computer system which are written using one of the computer languages are called computer software or software programs or simply software.
4 0
3 years ago
In which format is information stored on a hard drive?
Natalija [7]
The answer is binary
6 0
3 years ago
Complete the concept map on computer as outlined below​
USPshnik [31]

Answer:

Here is your answer.

have a great day

6 0
3 years ago
Other questions:
  • _________ are represented using diamonds linked withparticipant ETs
    6·1 answer
  • Which software can managers use to discuss financial performance with the help of slides and charts?
    7·2 answers
  • for what reason do some security professionals consider insiders more dangerous than outside intruders?
    8·1 answer
  • The picture that graphically represents the items you use in windows is called a/an
    5·1 answer
  • In Java
    6·1 answer
  • write the cell address for the following 1. First row and first column 2.First column and last row. 3. 10th column and 19th row.
    5·1 answer
  • Murray is a database technician. He has created a single enterprise database system. How is this better than multiple databases
    15·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • Please help me ASAP!
    11·2 answers
  • Assume the user responds with a 3 for the first number and a 5 for the second number.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!