In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target from a small number of sources.

Answers

Answer 1

Answer:

denial of service

Explanation:


Related Questions

Let’s say you’re publishing a message with the Hootsuite Composer. The message contains a link to a landing page, and you want to add a UTM parameter to that link to track click-throughs. What feature in the Composer would you use to do this?

Answers

Answer:

Ow.ly shortener

Explanation:

Ow.ly is a good example of a link shortener that helps shorten the UTM link in Hootsuite composer.

Cheers

Given a string name, e.g. "Bob", return a greeting of the form "Hello Bob!". helloName("Bob") → "Hello Bob!" helloName("Alice") → "Hello Alice!" helloName("X") → "Hello X

Answers

Answer:

public class num1 {

   public static String helloName(String name){

       return  "Hello "+name+"!";

   }

   public static void main(String[] args) {

       System.out.println(helloName("Alice"));

   }

}

Explanation:

Java programming language has been used for this task.

Start by defining a method that returns a String the method's name is helloName(name); Which receives a String parameter

In the method's body return the String name which is passed as an argument with the the word "Hello" concatenated.

Call The method in the main method passing any name as an argument

Final answer:

The task is to write a programming function that creates a personalized greeting using a given name. This is done by concatenating 'Hello ' with the name and an exclamation mark. The example modifies an initial greeting by changing the first character.

Explanation:

Creating Personalized Greetings in Programming

The question involves a basic programming task of creating a personalized greeting using a given string. When the function helloName is called with a parameter like "Bob", "Alice", or "X", it returns a greeting of the form "Hello Bob!", "Hello Alice!", or "Hello X!" respectively. This is typically achieved by concatenating the string "Hello " with the provided name and an exclamation mark "!".

The example provided in your question mimics a common operation in programming languages such as Python where strings are concatenated or modified. It demonstrates how the initial greeting 'Hello, world!' can be altered by replacing the first character with 'J' to create a new greeting 'Jello, world!'. To achieve a personalized greeting, one would concatenate "Hello " with the input name followed by an exclamation mark.

Here's a basic example in Python:

def helloName(name):
   return 'Hello ' + name + '!'


print(helloName("Bob"))   # Outputs: Hello Bob!
print(helloName("Alice")) # Outputs: Hello Alice!
print(helloName("X"))     # Outputs: Hello X!

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals. True False

Answers

Answer:

True

Explanation:

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals is a true statement.

COGNITIVE ASSESSMENT You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using

Answers

Answer:

Augmented Reality

Explanation:

Augmented Reality is a technology that superimposes a computer-generated image on a user's view of the real world, thus providing a composite view.

Cheers

Linux is a kind of software whose code is provided for use, modification, and redistribution, at no cost. What kind of software would this be considered from the choices available? Group of answer choices client/server subscription open source SourceForge

Answers

Answer:

Linux is a type of open-source software. The entire premise of open-source code is to make it as easy for people to develop and share as possible, instead of use as a vehicle to make money. This way, the collective knowledge of the community can make the program as secure and user-friendly as possible.

Explanation:

Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should be able to view and edit job records are the user who owns the record and all users in the Delivery profile.Which three platform sharing tools are required to support the above requirements? A. "Modify All" permission for Job Object on the Delivery Profile
B. "View All Data" profile permission on the Delivery Profile
C. Grant Access Using Hierarchy sharing setting on the Job Object set to false
D. Criteria-Based sharing rule for the Delivery Profile on the Job Object
E. Organization-Wide Default sharing setting of Private on the Job Object

Answers

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.

You have a WordPress site hosted on EC2 with a MySQL database hosted on RDS. The majority of your traffic is read traffic. There is only write traffic when you create a new blog. One of your blogs has gone viral and your WordPress site is struggling to cope. You check your CloudWatch metrics and notice your RDS instance is at 100% CPU utilization. What two steps should you take to reduce the CPU utilization?

Answers

Answer:

B. and D.

Explanation:

Based on the information provided it can be said that there are a couple things that can be done in order to reduce CPU utilization. First you can create an ElastiCache cluster and use this to cache your most frequently read blog posts, which will free up unnecessarily used space. Secondly you can create multiple RDS read replicas and point multiple EC2 instances to these read replicas, thereby spreading the load, which will prevent a single instance from taking the whole load.

A security administrator is testing the security of an AP. The AP is using WPA2. She ran an automated program for several hours and discovered the AP's passphrase. Which of the following methods was she MOST likely using?
A. IV attack
B. Disassociation attack
C. WPS attack
D. Evil twin attack

Answers

Answer: C

WPS attack

Explanation:

It is most likely a WiFi protected setup (WPS) attack. Reaver is a automated program that can brutally force attack an access point WiFi to discover its PIN. Once the PIN is discovered, it can be used to uncover the paraphrase or secret code used by the access point (AP).

Also, the attack typically does not show any sign to an average user as it is mostly undetected.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?A. Develop different versions of the same app for different programs. B. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. C. Feed the existing code into cross-platform tools to develop different versions of the same app. D. Use the same set of codes for different platforms.

Answers

Answer:

B. Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Explanation:

Cross-platform development involves building applications or programs to run on more than one Operating System (OS). It cuts across different platforms and devices, granting access to users no matter the device they are using. Remaining relevant in software development requires mastering tools to achieve this.

For Shania to make an old app designed for Android available on other platforms, she has to use cross-platform development tools that will help her to translate the code written for Android to other formats. Such tools include Adobe PhoneGap, Corona, Appcelerator among others.

Technician A says that temperature sensors decrease in resistance as the temperature​ increases; this is called positive temperature coefficient​ (PTC). Technician B says that some vehicle manufacturers use a stepped ECT circuit inside the PCM to broaden the accuracy of the sensor. Who is​ right?

Answers

Answer:

Technician B.

Explanation:

The claim of technician B that some vehicle manufacturers use a stepped ECT circuit inside the PCM to broaden the accuracy of the sensor is correct.

6.6 Write a function named timesTen. The function should have an integer parameter named number. When timesTen is called, it should display the product of number times 10. (Note: just write the function. Do not write a complete program.)

Answers

Answer:

   public static void timesTen(int num){

       int numTimesTen = num*10;

       System.out.println("The number "+num +" times 10 is "+numTimesTen);

   }

Explanation:

In the code snippet above which is written in Java programming language, A method (function) is created. The return type is void since this method according to the question will only give an output and not necessarily return a value.

The methods only int parameter is multiplied by 10

Using string concatenation the following output is given

The number 5 times 10 is 50: For an argument of value 5

Other Questions
When Salina was a young girl, a dog viciously attacked her as she was walking along a white picket fence. Since then, she displays intense fear of white picket fences. Salina is demonstrating:________.1. a descriminative stimulus2. superstitious behavior3. stimulus descrimination4. a phobia5. spontaneous recovery The Emperor is Chief of State; Prime Minister is the Head of Government;Parliament chooses the Prime Minister; a constitutional monarchy Whichcountry's government is being described by these points? how mant times does the haert beat i a minute Mary mixes white paint and blue paint in the ratio 2:3She makes a total of 20 litres of paint.How much more blue paint does she need to add to the mixture so that the ratio of white paint to blue paint becomes 1:7? John is saving $6 a week. He has already saved $28. How many weeks will it take John to reach his goal of $100? Which fraction is equivalent to 68? 3) Which of the following words best describethe climate of tropical rainforests biomes?a. Wetb. Mildc. Hotd. Dry The sum of two numbers is 47 and the difference is 19. What are the numbers? A rectangular prism has a length of 4 1/2, a width of 4 1/2 and a height of 6. Sally has a storage container for the prism that has A volume of 143 cubic. What is the difference between the volume of the prism and the volume of the storage container What are scientist doing to Pork to make it a GMO? Given a circle U which has a center at coordinates (1,3) and a point on its circumference at (2, 2), what is the area of the circle? Re-word please, thank you! which test result indicated a chemical change has taken place? All forms of communication have a(n) __built into them, How late to practice did William show up to practice? Which was the capital city of an Allied power during World War II ? "Sort the following objects as part of the system or not."An 80-kg quarterback jumps straight up in the air right before throwing a 0.43-kg football horizontally at 15 m/s . How fast will he be moving backward just after releasing the ball? A cell uses which of the following to accelerate chemical reactions enabling its metabolic machinery to operate? Anthony, the plant manager, was talking with another manager about Tim, the lead engineer in the corporate R & D department. Anthony remarked, "Tim is so bright, and he is an expert in designing products. But like so many experts, he cant imagine what its like to be as ignorant as the rest of us. I think at times, he cannot see things from an outsiders perspective." Tim is suffering from What are the five special senses and what distinguishes them from somatic senses such as mechanoreception (pressure, vibration and proprioception), pain (nociception) and heat (thermoception)?