1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
12

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.

After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack?
A. DOS
B. SSL Stripping
C. Memory leak
D. Race condition
E. Shimming
F. Refactoring
Computers and Technology
1 answer:
Anastaziya [24]3 years ago
5 0

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

You might be interested in
In Broadbent's filter model of attention, the stages of information processing occur in which order?
victus00 [196]

Answer:SENSORY STORE, FILTER, DETECTOR, STM.

Explanation:Donald Broadbent in 1958 stated one of the earliest theory of attention,he stated that physical features of messages are used to select one message for further processing and that all others are lost.This differs from inattentional blindness, which is when you focus hard on something and fail to notice unexpected things entering your visual area. He believes that

Information from all of the stimuli presented at any given time enters a sensory buffer with unlimited capacity.

3 0
3 years ago
How many possible mac addresses are there?
oksian1 [2.3K]
There are 6 octects ( 8 bit numbers ) in a MAC address, so there's 256^6 possible addresses.
6 0
3 years ago
Which of the following careers is part of the Printing Technology pathway?
torisob [31]
Textile designer i think

6 0
3 years ago
What is a client benefit of partnering with Accenture's Intelligent Platform Services<br> (IPS)?
charle [14.2K]
It’s a bot Bc when you do stuff you can believ it
8 0
3 years ago
Which program is commonly used to verify a new piece of hardware?
NeX [460]
<span>In the current software market, the most commonly used desktop operating systems fall into three groups: Microsoft Windows, Apple Mac OS, and Linux. Before upgrading the operating system, check the minimum hardware requirements of the new OS to ensure that it can be installed successfully on the computer. </span>
6 0
4 years ago
Other questions:
  • The _______________ layer of the TCP/IP protocol suite is responsible for making sure that what leaves one end of the network ar
    9·1 answer
  • The domain in an email message tells you the
    5·1 answer
  • A personal career profile for can be used to match what you know about yourself to what you know about different careers
    7·2 answers
  • When you're working with a word processing document and you press the del key, what happens?
    5·1 answer
  • How do airbags prevent injury?
    13·1 answer
  • Please help. 15 points!!!!
    8·2 answers
  • What are the names of the 3 main languages used for making websites
    10·1 answer
  • Machines may aid in making work easier over a longer distance. true or false.
    7·1 answer
  • What is the value of 8n when n= = 2?​
    13·1 answer
  • Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!