1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
6

hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map

s host names and IP addresses
Computers and Technology
1 answer:
shusha [124]3 years ago
7 0

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

You might be interested in
Specialized high-capacity second storage devices designed to meet organizational demands
zzz [600]

Answer:

CD devices

Explanation:

5 0
3 years ago
Read 2 more answers
After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the
oksian1 [2.3K]

Answer:

Option A i.e., SME for further investigation.

Explanation:

Following the reports of such a security incident into an SOC, an incident respondent examines the incident but could not determine the cause of that same incident as well as establish an appropriate response protocol. The ticket for an incident must be applied to SME for even more inquiry. So, the following answer is correct.

5 0
3 years ago
most dialog boxes in windows programs requiring navigation follow a similar procedure. true or false.
vfiekz [6]
I believe that is true

Hope this helps!! :)

8 0
3 years ago
. _______ view focuses on the text and content of a document, without much information on the page layout.
Georgia [21]
Read view
It allows to hide all instrument panels
5 0
3 years ago
Instructions
Reptile [31]

The assignment is about Telephone, internal combustion engine, and electrical light.

<h3>What is file?</h3>

A file is a  computer system container for storing data. Files used in computers are similar in characteristics to  paper documents used in libraries and office files. There are different types of files like text files, data files, folders, binary and graphic files and these different types of files store different types of data. A computer's operating system can store files  on optical discs, hard drives,  or other types of storage devices.

In most operating systems, a file must have a unique name within a specific directory. However, when creating a file name, some characters are considered illegal and therefore cannot be used. A file name consists of a name with an extension, also known as a file extension. The file extension is the two to four characters after the period of the full file name.

To learn more about file, refer;

brainly.com/question/29055526

#SPJ4

8 0
1 year ago
Other questions:
  • A technology company only hires applicants who are under the age of 30. This company could face possibly _________ consequences
    9·2 answers
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • Then standard toolbar appears whenever you select text true or fals
    15·1 answer
  • If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
    5·2 answers
  • The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
    15·1 answer
  • Which of the following is considered a modern method of communication?
    7·2 answers
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • What is up what everbody up to
    13·2 answers
  • What types of activities are ideal for a robot to perform?
    6·1 answer
  • Viruses that load from usb drives left connected to computers when computers are turned on are known as.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!