1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
11

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed

the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link
Computers and Technology
1 answer:
gavmur [86]3 years ago
4 0

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

You might be interested in
What symbol does access use to the left of a record when it is currently being edited and is therefore locked so that other user
dedylja [7]

Answer: It is a non-existing keyword or symbol in access

Explanation:

8 0
2 years ago
Categorize the following relationships into generalization, aggregation, or association. Beware, there may be n-ary associations
Oksana_A [137]

Answer:

Answer explained below

Explanation:

a. A country has a capital city.------------ aggregation(city is part of country)

b. A dining philosopher uses a fork. ----------- association(philosopher and fork are different entities)

c. A file is an ordinary file or a directory file. ------- generalization( both ordinary and directory files are having attributes of files)

d. Files contain records.--------- aggregation( records are part of File)

e. A polygon is composed of an ordered set of points. ----------- aggregation( points are parts of polygon)

f. A drawing object is text, a geometrical object, or a group. --------- generalization( text and geometrical objects are drawing object)

g. A person uses a computer language on a project. -------- aggregation( person and computer language are part of project)

h. Modems and keyboards are input/output devices. -------- aggregation( Modems and keyboards both are I/O devices)

i. Classes may have several attributes.------- aggregation( attributes are part of classes)

j. A person plays for a team in a certain year. ----------- aggregation(player is part of team)

k. A route connects two cities. --------- aggregation( route consists of two cities)

l. A student takes a course from a professor. ----------- association( student and course are separate entities)

5 0
3 years ago
RBTs are likely to be the ABA professionals who are implementing skills acquisition plans. In order to prepare and plan for a se
arlik [135]

Answer:

review session notes from the previous session, and decide how to proceed with the current session

Explanation:

RBTs are registered behaviour technicians who could also function as Adaptive behavior assessment professionals. RBTs often help their clients increase their skill level. This is done through the application of the skill acquisition plan. The skill acquisition plan includes such things as the : skill deficit, goal to tackle deficit, data measurement systems etc. In order to have a successful session, RBTs should check and review session notes for previous exercise and from there plan how to proceed with new session.

7 0
3 years ago
CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a c
Vilka [71]

Answer: On the same page

Explanation:

 The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.

All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.

The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.

 

8 0
4 years ago
What statement best describes operating systems?
GenaCL600 [577]

Answer:

An operating system, or "OS," is software that communicates with the hardware and allows other programs to run

3 0
3 years ago
Other questions:
  • When performing actions between your computer and one that is infected with a virus which of the following offers no risk becomi
    5·1 answer
  • Compare the specialized and statistical functions in excel
    10·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • People without digital literacy skills are often the victims of
    12·1 answer
  • this device can be used to type documents,send email,browse the internet,handle spreadsheets,do presentations,play games,and mor
    14·1 answer
  • Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
    10·1 answer
  • PLS HELP
    8·2 answers
  • Difference between the four generations of computers in a tabular form​
    8·1 answer
  • True or False <br> Hebrew Bible and the Koran were first written in English.
    15·1 answer
  • What is a thread? what resources does it share with other threads in the same process?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!