1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
7

If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originate

d.
Computers and Technology
2 answers:
suter [353]3 years ago
6 0
<span>The answer is IP address.  If you experience a denial-of-service attack, you can use firewall logs to determine the IP address from which the attack originated.</span>
Rashid [163]3 years ago
6 0

Answer: IP Address

Explanation:

Denial of service (DOS) attack is basically occur when the multiple system and the web servers are flooded with the bandwidth and the system resources. If the system are flooded with the traffic then it cause the denial of service attack. Botnet is one of the example of DOS.

  • When we experiencing the DOS attack then, we used the firewall logs for determine the origin of attack by using the IP address.
  • IP address is the internet protocol that uses for the communication purpose.
  • The IP address is in the form of numerical label that assigned to the every network devices  for the communication.
  • The main function of the IP address is that it is used for the location addressing.

 

You might be interested in
A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses comm
Sergeeva-Olga [200]

Answer:

He can determine if the network is operational with a ping to the IP address.

If this fails, it means this is a DNS issue.

He can also determine if a router is down between the source and the server

Explanation:

A successful ping to IP address indicates that the network is working and the web server is online. Failure means that the host cannot resolve the associated domain name.

Try the web server at 192.168.0.10 is reachable from the source host. A router is down between the source host and the server web-s1.cisco.com. There is a problem with the web server software on web-s1.cisco.com

6 0
3 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
3 years ago
What time is spellrd the same forwards and backwards​
Juliette [100K]
12:21 is the correct answer
6 0
3 years ago
A thermogram taken outside a house shows high amounts of thermal energy around the windows but not around the roof. which conclu
mestny [16]

The conclusion sustains the thermogram will be that the windows are not energy efficient, but the roof stands energy efficient.

<h3>What is Thermography?</h3>

Thermography exists a noninvasive method that employs an infrared camera to develop pictures that depict patterns of heat and blood flow on or around the body's surface. A thermogram taken outside a house shows high quantities of thermal energy around the windows but not around the roof. The conclusion that supports the thermogram will be that the windows are not energy efficient, but the roof exists energy efficient.

Thermal energy (also named heat energy) is produced when a rise in temperature pushes atoms and molecules to move faster and collide with each other. The energy that reaches the temperature of the heated substance is named thermal energy. The term "thermal energy" exists utilized loosely in various contexts in physics and engineering. It can guide several different well-defined physical concepts.

To learn more about Thermography refer to:

brainly.com/question/1500896

#SPJ4

The complete question is,

A thermogram taken outside a house shows high amounts of thermal energy around the windows but not around the roof.

Which conclusion supports the thermogram?

The windows and the roof are energy efficient.

The windows and the roof are not energy efficient.

The windows are not energy efficient, but the roof is energy efficient.

The windows are energy efficient, but the roof is not energy efficient.

4 0
1 year ago
What is the output of the following?
lys-0071 [83]

Answer: a. the number is: 14

Explanation:

i mean just try to write in 7 instead of x in the second line

then it would say the number is: ....

what is 7 times 2?

14

so the answer is a

5 0
3 years ago
Other questions:
  • After which stage in the information processing cycle can data be referred for future use?
    7·1 answer
  • NO BODY KNOWS! How old is Cynthia Blaise!?
    7·1 answer
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • Below is a recursive implementation of the factorial function. For what value of n will this function not produce the desired re
    8·1 answer
  • What does wireless technology use to transmit signals?
    7·1 answer
  • Assume that month is an int variable whose value is 1 or 2 or 3 or 5 ... or 11 or 12. Write an expression whose value is "jan" o
    10·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • Define and discuss statistical significance as it pertains to web analytics, formulate your own opinions of what this means. in
    8·1 answer
  • Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi
    8·1 answer
  • How are hyperlinks created and used within a presentation? Check all that apply. Hyperlinks are set to open another source file.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!