1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
3 years ago
6

Which type of attack cripples the network and prevents legitimate users from accessing network resources

Computers and Technology
1 answer:
yaroslaw [1]3 years ago
6 0

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

You might be interested in
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
Why is it important to organize your computer files?<br><br> “With a explanation”
Gwar [14]

Answer: So then every thing is not cluster together and you have everything where you can get to it faster and it just makes everything  100 times better then it not being organized :) hope this helped and if it didn't I'm so sorry

Explanation:

7 0
3 years ago
What is the main difference between a computer program and computer software​
NARA [144]

Answer:

Think of computer software sort of as DNA, because DNA is the human body's computer software. And a computer program is like an activity your body does.

Explanation:

Sorry if this didn't help.

7 0
3 years ago
Which of the following kinds of software is not usually included by an installed operating system?
Rus_ich [418]
It seems that you have missed the necessary options for us to answer this question, so I had to look for it. Anyway, here is the answer. Among the kinds of software, the one that is not <span>usually included by an installed operating system is the SPREADSHEET. Hope this helps.</span>
5 0
3 years ago
# Initialize variables
Ne4ueva [31]

numGuesses = 0

userGuess = -1

secretNum = 5

name = input("Hello! What is your name?")

while userGuess != secretNum:

   userGuess = int(input("Guess a number between 1 and 20: "))

   numGuesses = numGuesses + 1

   if (userGuess < secretNum):

       print("You guessed " + str(userGuess) + ". Too low.")

   if (userGuess > secretNum):

       print("You guessed " + str(userGuess) + ". Too high.")

   if(userGuess == secretNum):

       print("You guessed " + str(secretNum)+ ". Corret! "+"It took you " + str(numGuesses)+ " guesses.")

5 0
3 years ago
Other questions:
  • A type of touch screen that can be up to four feet by six feet is a(n) _____. plasma screen multitouch interface Electronic Pape
    10·2 answers
  • When creating an input/ output table, where do you enter the formula?
    5·1 answer
  • Which section of a personal narrative requires the most development
    9·1 answer
  • What is the real meaning of hack and crack?
    6·1 answer
  • Write the definition of a method twice, which receives an integer parameter and returns an integer that is twice the value of th
    14·1 answer
  • Name similarities between innovation and invention
    6·1 answer
  • Can some one help sorry I just so confused on this and I keep failing it I just need the help So choose the best answers
    12·1 answer
  • Mary works for a multimedia firm, and she spends long hours on a desktop computer. Recently, she expired back pain and visited h
    12·1 answer
  • Which of the following is a valid HTML reference to a CSS file?
    13·1 answer
  • Selection Sort List the resulting array after each iteration of the outer loop of the selection sort algorithm. Indicate the num
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!