1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alex41 [277]
2 years ago
12

A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.

After a few minutes, Internet and VoIP services are restored, only to go offline again at random intervals, typically within four minutes of services being restored. Outages continue throughout the day, impacting all inbound and outbound connections and services. Services that are limited to the local LAN or WiFi network are not impacted, but all WAN and VoIP services are affected. Later that day, the edge-router manufacturer releases a CVE outlining the ability of an attacker to exploit the SIP protocol handling on devices, leading to resource exhaustion and system reloads. Which of the following BEST describe this type of attack?
A. DOS
B. SSL Stripping
C. Memory leak
D. Race condition
E. Shimming
F. Refactoring
Computers and Technology
1 answer:
Anastaziya [24]2 years ago
5 0

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

You might be interested in
How are you today? I'm fine
sweet-ann [11.9K]

Answer:

no this is partick.

Explanation:

8 0
3 years ago
Read 2 more answers
________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate progr
Natasha2012 [34]

Answer:

Usurpation

Explanation:

In context of CIBS-210 it is known as Usurpation

6 0
3 years ago
A program that runs each line one at a time in order is called?
Oksi-84 [34.3K]

the answer is a one liner program

5 0
2 years ago
Exp19_Excel_AppCapstone_Intro_Collection
Olin [163]
Exp19_Excel_collection
8 0
3 years ago
Which of the following peripheral devices can be used for both input and output? mouse printer CPU touch screen on a tablet comp
LenaWriter [7]
Touch Screen, it provides both visual output and touch input.                                                
3 0
3 years ago
Read 2 more answers
Other questions:
  • Match each item with a statement below. a device used in mobile devices to sense the physical position of the device an area whe
    11·1 answer
  • A typical self-expelling fire extinguisher empties its contents in
    8·1 answer
  • Google Ads was designed to deliver three things to every advertiser: relevance, control, and results. It provides relevance by c
    11·1 answer
  • Thinking actively promotes critical thinking. Explain how thinking actively promotes critical thinking
    10·1 answer
  • An excel worksheet can have a maximum of ____ columns in a worksheet.
    14·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    5·1 answer
  • Which of the following is not one of the steps a company would take in an attempt to prevent a malfunction or failure of their p
    7·1 answer
  • A menu within a menu is called what?​
    5·1 answer
  • One of the benefits of holding an investment for over a year rather than selling it in less than a year is that the
    14·2 answers
  • 7. Type the correct answer in the box. Spell all words correctly.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!