1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
6

hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map

s host names and IP addresses
Computers and Technology
1 answer:
shusha [124]3 years ago
7 0

Answer:

DNS poisoning

Explanation:

This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.

You might be interested in
Can anyone answer this picture?
sasho [114]

This program multiplies integer inputs A and B, by repeatedly adding B to RESULT while decrementing A.


It will work fine when either A or B is zero. If A is zero, it will branch to QUIT immediately. If B is zero, zero will be added repeatedly to the result (which also is initialized with zero).


LOOP, RESULT etc. are called labels. They translate into a memory address location of a variable or machine instruction. But it is much more readable to have them as english words while creating your program. Also, they make your program relocatable, in the sense that while writing, you don't have to decide on which physical address your program will run.

7 0
3 years ago
WILL GIVE BRAINLIEST AND 75 POINTS!!!
pshichka [43]

Answer:

Glomar Challenger studies about the "age of rocks in various places in the ocean" in 1968

Explanation:

Glomar Challenger was a "deep sea research vessel" for marine geology and oceanography studies.

The vessel set out in 1968 on a "Deep Sea Drilling Program" in the Atlantic Ocean.

Samples were collected from various drilling locations and the study and analysis of these samples enabled the study of plate tectonics.

These samples also provided more information related to the rocks in oceans.

The vessel drilled cores containing rock salt, gypsum, anhydrite and several other evaporating minerals.

8 0
4 years ago
Read 2 more answers
You have an insurance policy with a $300 premium and a $500 deductible. How much should you expect to pay the insurance company
Assoli18 [71]
200$ it's easy 500-300
4 0
3 years ago
What are five features of word 2016 you would use to capture the attention of the target audience? Defend you decisions
Lyrx [107]
Here is my top 5:
1. Auto save feature. It's very important not to lose the writing when something happened to your computer while you were writing.
2. Synchronization with OneDrive. If something happened to your hard drive, you can backup your docs with OneDrive cloud.
3. You can view and edit PDF documents. Everyone needs it.
4. You can share your documents with other people and you can edit it together in online mode.
5. Improved "Red mode" which disables extra menus to view your documents.
5 0
3 years ago
Doreen is looking to drive sales on her website, and is considering creating a Google Display Remarketing campaign How might rem
JulijaS [17]

Answer:

It reaches members who have previously viewed to her website as the browse network websites and use network apps.

Explanation:

Doreen will trying to boost revenue through her site, and has been contemplating developing a Remarketing plan for Google Display.

However, it targets customers who have already viewed its site when the browse network sites and then access network applications that would enable it to achieve its promotional target.

7 0
3 years ago
Other questions:
  • The process of saving files to disk is called.<br> A.read<br> B. Write<br> C. Lock<br> D. Protect
    6·1 answer
  • Which describes how media and networks interact
    12·1 answer
  • After which stage in the information processing cycle can data be referred for future use?
    7·1 answer
  • When a crash results in property damages of any amount, the driver must notify:
    10·1 answer
  • What does the following code alert?
    10·2 answers
  • To rehearse giving a PowerPoint presentation, Hema would like to print out the presentation with all of the speaker notes. Hema
    10·1 answer
  • Counting calculus students. About A university offers 3 calculus classes: Math 2A, 2B and 2C. In both parts, you are given data
    6·1 answer
  • What does a blue painted curb mean?
    12·1 answer
  • Questions Presscomion
    9·1 answer
  • Which command will provide us with a list of the available internal commands (commands that are part of Command Prompt, such as
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!