1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
4 years ago
11

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es

tablishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________
Computers and Technology
1 answer:
Mashutka [201]4 years ago
8 0

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

You might be interested in
Diana is running a successful remarketing campaign. She wants to expand her reach with other targeting options. While creating a
mart [117]

Answer:

B: Audience interest around different topics.

Explanation:

When using Google Ads, and the main aim is to create a campaign for a particular marketing activity, there are several options that makes Google Ads the ideal application for this purpose. However, choosing similar audiences under the targeting option is simply telling google to find users or audiences that are interested in the different topics, but are in one way or the other connected to your marketing activity or campaign.

8 0
4 years ago
Configuration reviews are not needed if regression testing has been rigorously applied during software integration.
goldfiish [28.3K]
B) False, reviews and constant matinese is always needed, reviews help the creators understand what people think needs work and what they like, the updates on the site will implement these wants and needs.
8 0
3 years ago
A computer user is listening to an audio broadcast on the internet through an ssl vpn. the type of encryption cipher used in thi
Step2247 [10]
The answer is <span>Block cipher.  </span><span>A </span>block cipher<span> is a method of </span>encrypting<span> text </span><span>in which a cryptographic key and algorithm are applied to a </span>block of data at once as a group rather than to one bit at a time.  They<span> split the input text into fixed-size chunks called  </span>blocks<span>. The operation of a </span>block cipher<span> is to take a </span>block<span> of input text and a </span>block<span> of key to produce a </span>block<span> of output text.</span>
5 0
3 years ago
You need to reduce the number of unplanned rollbacks of erroneous production deployments in your company's web hosting platform.
Lelu [443]

Answer:

1. Introduce a blue-green deployment module

2. Fragment the monolithic platform into micro services.

Explanation:

1. Blue-green deployment is a type of  technique which minimizes downtime and risk by running two identical production environments called Blue and Green.

This technique eliminates downtime due to app deployment. In addition, blue-green deployment reduces risk: if something unexpected happens with your new version on Green, you can immediately roll back to the last version by switching back to Blue.

2. The scenario behind microservices architecture is that some types of applications become easier to build and maintain when they are broken down into smaller, composable pieces which work together. Meaning that each component is developed separately, and the application is simply the sum of its constituent components.

Each service runs a unique process and usually manages its own database  in a micro services architecture,. This provides development teams with a more decentralized approach to building software,ans also allows each service to be deployed, rebuilt, redeployed and managed independently.

Micro services do have a few disadvantages when compared to monoliths:

   Micro services, unlike the internals of a monolith,  communicate over a network. In some situations, this can be seen as a security concern. Istio solves this problem by automatically encrypting the traffic between microservices.

    Achieving the same level of performance as with a monolithic approach can be difficult because of latencies between services.

 

3 0
3 years ago
Given the following pseudocode, which is the argument? Module main() Call curveScore(82) End Module Module curveScore(Integer sc
nalin [4]

Answer:

82

Explanation:

Arguments are the values that are passed to between the programs or the function or subroutines.Here in the pseudo code the argument that is passed to the function curveScore is 82 in the main module.Then the pseudo code for the curveScore is present.So the function will consider the value of the score as 82.

Hence the answer to this question is 82.

8 0
3 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • What is your perception of what a safe classroom looks like
    15·1 answer
  • What should be included as part of the approval process? in relation to computer forensics
    14·1 answer
  • The various online technology tools that enable people to communicate easily via the Internet to share information and resources
    5·1 answer
  • To create a formula in______, you would first click in one of the cells​
    14·2 answers
  • 8. What is the correct jQuery code to set the background color of all p elements to red?
    15·1 answer
  • Given the following schedule, show the locks that will occur and the subsequent schedule. Assume that strict 2PL is in effect, w
    13·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • // This pseudocode segment is intended to compute and display
    7·1 answer
  • Why is haptic feedback important?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!