1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
9

What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag

es back to the computer that originated the suspected spam? Multiple Choice typosquatting teergrubing Internet censorship website name stealing
Computers and Technology
2 answers:
Burka [1]3 years ago
8 0

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

Aloiza [94]3 years ago
4 0

Answer:

teergrubing

Explanation:

The tern "teergrubing" was derived from the German term "tar pit." A teergrube is a process where the email system on a computer's main server is  intentionally set slow so that it can detect and sniff out potential spam attacks on the computer's email system. In addition, the system ensures that the email system is enabled to bounce off the emails from the spammers by identifying the pathway used to send the email. As soon as the email is labelled malicious, the email is immediatetl labelled "spam"or as potentially dangerous and is shifted to the spam folder or sent back quickly to the owner. as a rejected email.

You might be interested in
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
Molodets [167]
The answer is a A. - Excel performs operations based on the order of Precedence
4 0
3 years ago
How do you change ip?
Fittoniya [83]
Unplug your router and plug it back in :)

Otherwise if you have a static IP contact your ISP for them to change it :D
5 0
3 years ago
What is decorator and how to use it wit Python programming language?
SCORPION-xisa [38]

Answer:

Decorators are very powerful and useful tool in Python since it allows programmers to modify the behavior of function or class. Decorators allow us to wrap another function in order to extend the behavior of wrapped function, without permanently modifying it.

Explanation:

5 0
3 years ago
Which statement is true of arrays? A) Array elements cannot be reset after the array is declared. B) Only whole numbers can be s
vekshin1

Answer:  Option (D) is correct

Explanation:

Array subscripts are used for refereeing to a individual element in the array.It is created by subscript operator for naming it.It can define the value about location often element. Array subscript can contain whole numbers only.

  • Other options are incorrect because array can be reset,other number along with the whole numbers can get stored in array and it can take high execution time.
  • Thus, the correct option is option(D.)
7 0
4 years ago
Difference between desktop, web and mobile apps
Lyrx [107]

there are many differences, but the most prominent are that they have different apis (aplication programing interface) and different architecture

also mobile apps tend to use less system resources and are more regulated by services like the google play store, opposed to the fairly unregulated uwp platform used by most windows machines.  


4 0
4 years ago
Other questions:
  • You can deselect multiple selected sheets beginning with the sheet1 tab by pressing the ____ key and clicking the sheet1 tab.
    15·1 answer
  • One cost of starting your own business is _____.
    12·1 answer
  • How can touch typing quickly but accurately improve your earnings (the money you can make)
    15·2 answers
  • 6) Sometimes it is difficult to read a piece of code and understand what the code will do. For this reason, you may want to add
    9·1 answer
  • Consider a system running 10 I/O-bound processes and 2 CPU-bound process. Assume that the I/O-bound processes issue an I/O opera
    9·1 answer
  • In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a
    14·1 answer
  • Which of the following would be an appropriate use of a check box control?
    15·1 answer
  • who thinks homework is anoyying? (freddy randomly started thinking scince he was the leader he caould start acting like a teache
    8·2 answers
  • I need trash talk for a comeback:
    11·2 answers
  • What is the password based off of the clues
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!