1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
14

In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr

om many locations at the same time.
Computers and Technology
1 answer:
Blababa [14]3 years ago
8 0

DDoS - Distributed Denial of Service

<u>Explanation:</u>

  • In DDoS attack, the attack comes from various system to a particular one by making some internet traffic.
  • This attack is initiated from various compromised devices, sometimes distributed globally through a botnet. It is different from other attacks  such as (DoS) Denial of Service attacks, in which it utilizes an unique Internet-connected device ( single network connection) to stream a target with the malicious traffic.
  • So in DDoS, multiple systems are involved in the attack and hence we can conclude that as the answer.
You might be interested in
2.<br> The force of impact is
NNADVOKAT [17]

Answer:

lực ( Tiếng Anh : force ) là bất kỳ ảnh hưởng nào làm một vật thể chịu sự thay đổi, hoặc là ảnh hưởng đến chuyển động, hướng của nó hay cấu trúc hình học của nó.

Explanation:

7 0
3 years ago
A rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a P
Zanzabum

Answer:

TRUE

Explanation:

A rootkit is a collection of computer software, typically malicious, that is designed to grant an unauthorized user access to a computer or certain programs. Once a rootkit is installed, it is easy to mask its presence, so an attacker can maintain privileged access while remaining undetected.

Rootkit detection is difficult because a rootkit maybe able to subvert the software that is intended to find it.

Rootkits work by using a process called modification (the changing of user account permissions and security).

Rootkits are not malware themselves, but rather a process used to deploy malware on a target.

Therefore, it is TRUE that a rootkit is software and file folders that are hidden from view and permit viruses, spyware, and malware to be installed on a PC without the knowledge or consent of a user.

3 0
3 years ago
Identify the commands for the following list operations.
Bumek [7]

Answer:

D

Explanation:

the answer is D because it does exactly what the problem says.

3 0
3 years ago
Sometimes data you export from Access needs to be formatted as a text file instead of an Excel file.
g100num [7]

Answer:

b. False

Explanation:

Microsoft access is a database management application that can store data that can be queried from every other microsoft applications like Word, Access, Onenote etc. its attachments can be converted to best best suit the application or client that needs the file or data.

Accesss database sheets are very to Excel worksheets or books. Tabular data, Graphs and most (if not all) data format can be linked, imported or queried between Access and Excel application. Formatting files (example csv files) to text are not necessary or encouraged when exporting files.

8 0
3 years ago
1.Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet
konstantin123 [22]

Answer:

16 subnets and 14 hosts assignable IP addresses.

Explanation:

Computer networking is the interconnection and intercommunication of computer devices. These computer devices can be connected using cables or wirelessly. All devices in a network must have an IP address.

Subnetting a network is a process of preventing the waste of IP addresses for the purpose of security and cost. IP4 addresses are 32 bits in size (4 octets) and the host and subnet size is dependant on the host and network bit configuration.

The IP address 200.245.10.150/28 is a class A network address but subnetted to borrow four bits from the fourth octet to produce 16 subnets (2 ^ 4 bits borrowed) and 14 host IP addresses (2^ 4 bits remaining in the fourth octet - 2, which is the network and broadcast addresses).

3 0
3 years ago
Other questions:
  • In which of selye's stages in death a possible outcome?
    5·1 answer
  • What feature of the new internet browser, microsoft edge, allows you to write or draw on a web page, highlight items, erase your
    5·1 answer
  • Today encoding scheme has taken over ascII by what
    5·1 answer
  • What is wrong with my code?
    7·1 answer
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • A variation of pronounce is a. Proclaim c. Produce b. Profound d. Pronunciation Please select the best answer from the choices p
    11·1 answer
  • Whereas lines of competition are clearly defined in the more established industries, in the Internet industry they are blurred a
    9·1 answer
  • When a climbing distance of __________, landing platforms must be in place every __________ feet. Platforms will be offset from
    12·1 answer
  • Choose the correct answer
    6·1 answer
  • Explain the term creating in word processing​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!