answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
2 years ago
14

What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier

to trace back to their source than others?
Computers and Technology
1 answer:
cestrela7 [59]2 years ago
4 0

<u>Explanation:</u>

Note, a DoS (Denial of Service) attack is <u>different in scope from a DDoS (Distributed Denial of Service) </u>attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

You might be interested in
You work for a car rental agency and want to determine what characteristics are shared among your most loyal customers. To do th
BigorU [14]

Answer:

c. classification

Explanation:

In the given situation, since you want to know what attributes shared among the most loyal customers for this you want to use the data mining software that refers to convert the raw data into the useful information so that it could become meaningful for the organization

In order to know about the characteristics we have to use the classification so that we get to know the characteristics i.e shared among the trusted customers

6 0
2 years ago
5. You just bought a new hard drive for youYou plan to use this as a secondary hard drive to store allcomputeryour UMA files. On
wel
Format and mount the drive. 
Formatting erases the drive and sets it up so the system can read and write to it.
Mounting the drive allows the system to have access to the drive and read and write to it. 

If you want to get more specific in Windows you can open registry editor and change the paths of the drive to save in the new location.
4 0
2 years ago
Use the AND function with appropriate arguments in cell H11 to determine if there is a force out at third base. There is a force
Pie

Answer:

=AND($C11 = "Yes", $D11 = "Yes")

Explanation:

The AND function takes conditional inputs and tests if each of them are TRUE. If all of the inputs are TRUE, the function will output TRUE but if any one of them are not the function will output FALSE. This scales to multiple inputs but this example only has two conditions. It is important to remember that we want to compare a string so our condition must be "Yes", not just Yes.

We also use a relative cell reference, "$", on the columns C and D since we always want to use the "Runner on 1st" and "Runner on 2nd" columns.

6 0
2 years ago
A Salesforce administrator adding a recommendations carousel component in Community Builder. The page displays correctly in Comm
disa [49]

Answer:

The page changes with the recommendation component have NOT been published.

Explanation:

The community builders are generally used to identify different opportunities by utilizing the necessary creativity, analysis and strategies. This will ensure that the objectives are achieved at the end of the day. Based on the problem encountered during the operation, it shows that the necessary page changes were not published.

4 0
2 years ago
A user requests an unencrypted webpage from a web server running on a computer, listening on the Internet Protocol address 10.1.
Minchanka [31]

Answer:

10.1.1.150:80

Explanation:

Socket address is the combination of an IP address and port number.

HTTP is what most unencrypted webpage use, instead of HTTPS which is the encrypted version of HTTP.

By default, webserver using Hypertext Transfer Protocol (HTTP) uses a standard port known as port 80.

The Socket address which is the combination of the IP address and standard port number will be something like this:

10.1.1.150:80

3 0
2 years ago
Other questions:
  • Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
    6·1 answer
  • Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
    14·1 answer
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • A method countDigits(int num) of class Digits returns the remainder when the input argument num(num &gt; 0) is divided by the nu
    10·1 answer
  • Print a message telling a user to press the letterToQuit key numPresses times to quit. End with newline. Ex: If letterToQuit = '
    12·1 answer
  • Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogu
    5·1 answer
  • Create the strAnalysis() function that takes 1 string argument and returns a string message. The message will be an analysis of
    15·1 answer
  • This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given
    9·1 answer
  • What is an input to the Program Increment Planning process that highlights how Product Management plans to accomplish the Vision
    15·1 answer
  • How do many corporations most likely manage the health and safety of their employees and the workplace?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!