1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrezito [222]
4 years ago
9

Which of the following protocols help IP in multicast service?

Computers and Technology
2 answers:
maw [93]4 years ago
7 0

Answer:

I guess IGMP.............

enyata [817]4 years ago
5 0

Answer:

IGMP

Explanation:

The correct answer is actually IGMP snooping.

so from your options it's IGMP

are you interested in cyber security?

You might be interested in
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
In which year was chip used inside the computer for the first time?? ​
AfilCa [17]

the first chip was invented in 1975

hope this help!

5 0
3 years ago
Read 2 more answers
Match each law with the corresponding descriptions. Wassenaar Arrangement HIPIAA PCI DSS FERPA GLBA SOX A. controls the way fina
3241004551 [841]

Answer:

A. controls the way financial institutions deal with private information of individuals.

Answer is: GLBA

B. Provides privacy for educational records.

Answer is:  FERPA

C. protects investors from fraudulent accounting activities.

Answer is: SOX

D. International agreement that controls the export of encryption technologies.

Answer is: Wassenaar Arrangement

E. Provides data privacy for safeguarding medical information.

Answer is: HIPAA

F. Provides safeguards for credit card transactions.

Answer is: PCI DSS

Explanation:

A. Gramm-Leach-Bliley Act (GLBA) is a federal law. This law deals with the financial institutions. These institutions provide financial services like loans. insurance etc and this law controls and deals with how these institutions handle and protect the confidential information of individuals i.e. their customers private data.

B. Family Educational Rights and Privacy Act (FERPA) is a federal law which deals with the privacy of academic records of students. Academic record include the student's transcripts, contact information, reports related to discipline, conduct and exam reports. These records can be viewed by the parents of the children and these records are protected by the institutions and they are not allowed to disclose or release this information to others.

C. Sarbanes-Oxley Act SOX is an act which protects from the fraudulent accounting activities by companies and the companies have to conform to the SOX. It also provides protection for financial records.

D. Wassenaar Arrangement is export control agreement for weapons and critical goods, equipment and technologies. It controls the spread and delivery of such equipment and technologies that can cause destruction of any kind thus considering the international and regional peace and security.

E. Health Insurance Portability and Accountability Act (HIPAA) is an act that deals with the provision of medical data and health information protection. This information can also be in electronic form. So many health care systems and applications which provides security such as by controlling access to the medical information of an individual and at the same time provides facilities and flexibility by adopting new technologies which has improved the patient and health care.

F. The Payment Card Industry Data Security Standard PCI DSS deals with the protection of credit, debit and cash card transactions. PCI DSS have some policies regarding the security. These policies ensure to improve the security of the card transactions and the goal is also to provide the card holder with the protection from the misuse of their sensitive data. So the companies are required to accept or process the data of the cardholder in a secure way. This will protect the card holder against data breaches.

8 0
4 years ago
An indicator is a comprehensive analysis of critical information
ioda

Answer:

True.

Explanation:

An indicator is a comprehensive analysis of critical information by an adversary normally providing the whole picture of an agency's capabilities.

Hope this helps!

3 0
4 years ago
Every character, number, or symbol on the keyboard is represented as a _____ in computer memory.
Lorico [155]
Every character, number, or symbol on the keyboard is represented as a binary number in computer memory.
3 0
3 years ago
Read 2 more answers
Other questions:
  • E-mail is an temporary message medium.<br> a. True<br> b. False
    5·2 answers
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • How many Pokemon have only one type? In other words, for how many Pokemon is Type2 blank?
    6·1 answer
  • How do you view a presentation as your audience would see it?
    14·2 answers
  • An insulated anti-short fitting required to be installed in the ends of Type AC cable to protect the wires from abrasion is typi
    13·1 answer
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem
    7·1 answer
  • What do you understand by Multiprotocol Label Switching, how it works and is helpful in today's network scenario.
    15·1 answer
  • Answer Please
    12·2 answers
  • Which requires large computer memory?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!