1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
3 years ago
12

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.

After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack?
A. DOS
B. SSL Stripping
C. Memory leak
D. Race condition
E. Shimming
F. Refactoring
Computers and Technology
1 answer:
Anastaziya [24]3 years ago
5 0

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

You might be interested in
What is the name of the the world cell of the internet?​
irga5000 [103]

Answer:

mobile web is the the world cell of internet

7 0
3 years ago
Show a parse tree and a leftmost derivation for : B = C * (A + B)
11111nata11111 [884]

Answer:

mhyfocnu,sobgu,kvngwugwe8hri

Explanation:

sovijbjxyzkuvcg

7 0
3 years ago
Ill give alot of points if you answer: How do I get a 100 dollar ps4
stepladder [879]
Uh how do you get a little blue box in a sandwich
8 0
3 years ago
Read 2 more answers
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
I need help with this plz! It’s for a test and I really need help
Bas_tet [7]

Answer:

c

Explanation:

assuming you are coding in python and have not install any calculation codes, the answer is most likely c

4 0
3 years ago
Other questions:
  • What formula would be used to add two cells together after the equal sign?
    9·2 answers
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    7·2 answers
  • Select the term used to describe the process, within the context of Active Directory, that allows a person with higher security
    5·1 answer
  • What are the advantages of Napier bones?​
    15·1 answer
  • In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following
    12·1 answer
  • A general rule for printing is to use _____ fonts for headlines and serif fonts for body text
    6·1 answer
  • How to delete Brainly account ?​
    12·1 answer
  • If a employee has a grade grater than or equal to 18, then he she will get 50% bonous on the basic pay. Otherwise, the employee
    5·1 answer
  • How do you detect my account for brainly?
    14·1 answer
  • kidede secondary school in Kotido district has been selected to participate in the final continental debating competitions with
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!