1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
6

hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map

s host names and IP addresses
Computers and Technology
1 answer:
shusha [124]3 years ago
7 0

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

You might be interested in
What is C.R.A.T systems used for?
worty [1.4K]

Answer:

CRAT(cred.research and tech) is used to find credible good, sources on the internet to research a certain type of tech

ex: you can use CRAT to find good research websites for nanotech, that are trustworthy and informative

8 0
4 years ago
Write a program that reads an arbitrary number of integer that are in the range 0 - 50 inclusive and counts how many occurrences
Anna [14]

Answer:

Check the explanation

Explanation:

import java.util.Scanner;

public class Count

{

   public static void main(String[] args)

   {

       // creating array of store to store count of

       //every integer entered

       int[] store = new int[51];

       System.out.println("Enter any integers between"+

       " 0 and 50, and if you are done then enter any"+

       " integer out of the range");

       System.out.println("Enter Integer: ");

       //taking input of first integer

       Scanner scan = new Scanner(System.in);

       int integer = scan.nextInt();

       //looping for integers entered in range

       //to count its occurance

       while(integer >= 0 && integer <= 51)

       {

           //adding count to 'store' array of that

           //particular array of value entered

           store[integer] = store[integer] + 1;

           System.out.println("Enter Integer: ");

           integer = scan.nextInt();

       }

       //printing number of times each integer is entered

       System.out.println("printing number of times"+

           " each integer is entered");

       for (int i=0; i < 51; i++)

       {  

           if (store[i] > 0)

               System.out.println(i + ": " + store[i]);

       }

   }

}

Kindly check the result below

7 0
3 years ago
Write a statement that declares a prototype for a function add, which has two int parameters and returns an int .
Anarel [89]
Int add( int, int );
4 0
3 years ago
A ________ is a single media file including art, sound, animation, or movies.
Ksenya-84 [330]
AVI is a type of media file.
4 0
3 years ago
A group of computers that are interconnected order to share information or document is called a
Shkiper50 [21]
Group of computers that are interconnected in order to share information or documents is called <span>Computer network.



                                                            
Hope this helps.
</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a new function called "listmax" based on the following IPO # function: listmax # INPUT: a list # PROCESSING: obtains the l
    9·1 answer
  • How to learn how to use computers
    9·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • If you have a document that is relevant to more than one folder in your computer what should you do?
    8·1 answer
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • Solid state components are less likely to fail because they:______.a. are driven by precise sets of software instructions. b. ha
    8·1 answer
  • Sonja is writing a program to compare two numbers and print the larger number. Which of these should be used?
    6·1 answer
  • Calculate the value of z. Given v=4, w=5, x=8, y=2z= (v+ w) * x / y;print (“value of z is “, z)
    8·1 answer
  • Explain how to create a constant variable. Give an example of creating a speed constant that does not include a decimal.
    8·2 answers
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!