1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
11

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed

the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link
Computers and Technology
1 answer:
gavmur [86]3 years ago
4 0

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

You might be interested in
Look at the following description of a problem domain:The bank offers the following types of accounts to its customers: saving a
Alchen [17]

Answer:

The answers are explained below

Explanation:

1) Identify the potential classes in this problem domain be list all the nouns

class Customer

class Acco  unt

2) Refine the list to include only the necessary class names for this problem

the class customer is not necessary to solve the problem itself, therefore the only class could be the account class

3) Identify the responsibilities of the class or classes.

The responsibilities of the class account will be

* determination of the type of account--> Acc  ount . type(char)

*  deposit money into the account --> Acc  ount . de posit(float)

* withdraw money into the account --> Acc  ount . with draw(float)

* show balance of the account --> Acc  ount . bal ance()

* generate interest --> Acc  ount . int erest()

Please join the words together. I used spaces due to regulations

5 0
4 years ago
Write a computer program that computes the duration of a projectile’s flight and its height above the ground when it reaches the
Citrus2011 [14]

Answer:

#include <stdio.h> #define Gray 32.17 /* gravitational constant */ #include <math.h> /*cos definition*/ #define PI 3.14159265

int main(void) double Theta; /*input-angle(radians)of elevation*/ double Distance; /*input-distance (ft) to target */ double Velocity; /*input-projectile velocity (ft/sec)*/ double Time; /* output-time(sec) of flight*/ double Height; /*output-height at impact*/

printf("Enter Distance> "); scanf("%f", &Distance);

printf("Enter Radians> "); scanf("%f", &Theta);

printf("Enter Velocity> "); scanf("%f", &Velocity

Time = Distance / (Velocity * cos(Theta*PI/180.0) ) ;

Height = (Velocity *sin(Theta*PI/180.0)*Time) - Grav*(Time* Time) );

printf("The time of flight is %.3f seconds.\n", Time); printf("The height at impact is %.3f feets.\n", Height);

system("pause");

return (0);

7 0
3 years ago
what optimizes airflow, keeps cylinder pressure in a certain range, and determines the engine's operating range?
emmainna [20.7K]
If you have choices, then I mut assume that these are following:
A. valve lift
B. push rod
C. intake manifold
D. valve timing. I think the answer is letter A.
6 0
4 years ago
Answering a questi
irina1246 [14]

Answer:

character

Which word (s) best describe personality. character

4 0
3 years ago
Why should programmers use a Post Mortem Review?
Zina [86]
The goal of a postmortem is to draw meaningful conclusions to help you learn from your past successes and failures. Despite its grim-sounding name, a postmortem can be an extremely productive method of improving your development practices.
8 0
4 years ago
Other questions:
  • 1. When you write HTML code, you use ______ to describe the structure of information on a webpage. a. a web address b. tags c. s
    6·1 answer
  • Word processing software allows users to do which of the following:
    10·1 answer
  • Which of the following is the correct code to link the text "Sunny Days" to the website www.sunnysunshine.com?
    15·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an inf
    12·1 answer
  • What is the name of the file manager in Microsoft Windows?​
    5·1 answer
  • What is a non-example of job skill
    13·1 answer
  • What is the output of the following program?
    11·2 answers
  • Hattie uses the line of code num == 7 to assign the number 7 to the variable named num. What correction should be made?
    7·1 answer
  • Which of the following correctly stores 45 squared in the variable x?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!