1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
7

Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

Computers and Technology
1 answer:
Scrat [10]3 years ago
6 0

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

You might be interested in
A gui allows you to interact with objects on the screen such as icons and buttons true or false
gizmo_the_mogwai [7]
The answer to your question is true
5 0
3 years ago
Cookies Are Us runs a series of 100 cookie stores across the Midwestern United States and central Canada. At the end of each day
ivanzaharov [21]

Answer:

As we can see that there are limited application requirements in this case, an ordinary broadband would be enough for the file transfer of daily information to the headquarter. If broadband is not available, dial up internet would do the job.

In my opinion Star Architecture could be another option to use in such situations. Start architecture has a dedicated circuit and it has the capability to route all messages from a central location in a network to client computers.

Explanation:

6 0
4 years ago
Select the correct answer.
zepelin [54]

Answer:

A.

Explanation:

My best guess is this answer. Tell me if I got it wrong, but it sounds right to me.

6 0
3 years ago
Define the following:-<br><br>1) cryptography<br><br>2) Quantum Cryptography​
Readme [11.4K]
1.) the art of writing or solving codes.
2.) the science of exploiting quantum mechanical properties to perform cryptographic tasks.

hope this helps :)
8 0
3 years ago
Read 2 more answers
Your sister wants to purchase Microsoft Office 2013 for her new laptop. She doesn't want to pay for a subscription, and she want
Pavel [41]

I would buy Microsoft Office 2013 Home and Business Pc License. Its better to purchase the product in all rather than a subscription.

5 0
3 years ago
Other questions:
  • EDI decreases ______
    15·1 answer
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • You can write as many constructors for a class as you want, as long as they all have different ____ lists.
    8·1 answer
  • (08.03 MC) Maya is a senior in high school and would like to pursue a career in web design. She needs more information about wha
    11·2 answers
  • The larger the Word Size of a computer
    6·1 answer
  • These icons cannot be removed from the Dock. Finder e-mail music player Trash
    14·1 answer
  • Can someone please explain this issue to me..?
    12·2 answers
  • Please Help me no links.
    6·1 answer
  • ¿Cómo afecta negativamente a las relaciones familiares el uso de la tecnología?
    7·1 answer
  • Briefly the conceptual model of effective computer based instruction for adults outlining three units (output, Process and input
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!