1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
14

An engineer learns a new security threat mitigation technique. The technique maps an IP address to a non-existent host, and is u

seful in stopping denial of service attacks. Traffic heading to these IPs can be captured for analysis or discarded. Considering the given strategies, which does this technique relate to? Select all that apply.
A. Black hole
B. Sinkhole
C. Forward proxying
D. Reverse proxying
Computers and Technology
1 answer:
xenn [34]3 years ago
5 0
A. In network architecture, a black hole drops traffic before it reaches its intended destination, and without alerting the source. A simple example is traffic sent to an IP address that an admin mapped to a non-existent host.
B. A sinkhole is similar to configuring a black hole, and often used interchangeably. With sinkholing however, an admin usually retains some ability to analyze and forward the captured traffic.
You might be interested in
A person clicks on an ad of a fitness club in a blog on nutrition. The person conducts a search on yoga and moves to another web
Sloan [31]

Answer: the answer is B.

hope this help

3 0
3 years ago
Name the sections of an instruction.
topjm [15]
Instruction in memory has two parts: opcode and operands. The operands are subjects of the operation, such as data values, registers, or memory addresses. Due to variety of opcodes and operands, instructions may occupy different sizes of bytes in memory
3 0
3 years ago
What will happen when a user attempts to login to salesforce from an ip address that is outside the login ip range on the user's
podryga [215]

Answer:

The answer to this question is option "d".

Explanation:

The answer is user will not be able to login at all. The user wants to log in to the salesforce by its IP address. But in the server, all the IP addresses will be registered for their special work. When the user inserting their IP address to log in to the salesforce. The first server will be checking into there database. If IP address doesn't match it will not permit to access salesforce because in their server it is not a valid IP address. It is registered in sever but not for this user.

So the answer to this question is option "d".

7 0
3 years ago
Who wants to give free points to me?
Bad White [126]

Answer:

I can :) just comment lol

3 0
3 years ago
Read 2 more answers
A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using
Ymorist [56]

Answer:

The answer is "implement on group 2 and group 3".

Explanation:

In the given scenario, When technology workers are using in the project teams. People like to be stable, and we can't allow wireless network transmission to maintain their security and privacy. When we considering category 1 being the only ones who have links to a higher authority, that's why Group 2 and Group 3 were needing to be implemented.

3 0
3 years ago
Other questions:
  • Do Y’all know how to view your answers to others people questions on your profile? Please answer fast
    14·1 answer
  • Which of the following is a true statement about psychological tests administered by computers? computers make standardization e
    9·1 answer
  • A student has five college classes and has to complete reports or projects for each class. The student is in his sophomore year
    15·2 answers
  • Describe the following types of data hazards. RAW WAR WAW
    13·1 answer
  • You have just changed the system time within your computer's BIOS. You choose to save the settings upon exit. What happens next
    14·2 answers
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • What is the term for a Web site that allows users to access and interact with software from any Internet-connected computer or d
    11·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Each student has a record on a file consisting of the following data: Student last name, Student ID (numeric), GPA (a decimal nu
    7·1 answer
  • In a relational database, information is organized into tables in which each row represents a(n ) ________. Group of answer choi
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!