![itsstaytay200](/avatars/33348.jpg)
itsstaytay200
08.03.2020 •
Computers and Technology
Jack, a skillful hacker targeted a major banking services firm located in Japan, using the LOIC (Low Orbit Ion Cannon) tool, Jack made the number of HTTP requests rise to a high level, which made the victim's server with the number of requests and resulted in failure of server responding to the request and crashed. Which type of attack Jack performed in the above scenario?
Solved
Show answers
More tips
- A Animals and plants How to Properly Care for Orchids: Secrets to Successful Cultivation...
- W Work and Career Which types of activities are not subject to mandatory licensing?...
- C Computers and Internet Thin Client: What It Is and Why You Need It?...
- F Food and Cooking The Most Delicious and Simple Fish in Batter Recipe...
- F Food and Cooking Red Caviar: How to Choose the Best?...
- C Computers and Internet Clearing Cache: How to Speed Up Your Browser...
- S Style and Beauty How are artificial nails removed?...
- S Style and Beauty Secrets of Tying a Pareo: 5 Ways...
- F Food and Cooking Everything You Need to Know About Pasta...
Answers on questions: Computers and Technology
- M Mathematics 6 is 25% of what number?...
- M Mathematics 20 is 8% of what number ?...
- M Mathematics 7 is 70% of what number...
- H History Why is Obama a good leader...
- M Mathematics 5 times what equals 275?...
- M Mathematics F(h)=-6h-2/3 Find f(-3)...
- M Mathematics What is 15x - 12y = 60 I DON T KNOW...
- M Mathematics What is 25% out or 192...
- E English 8.54 round to nearest tenth...
- C Chemistry What elements make up glass and concrete?...
Ответ:
denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)
Explanation:
Denial-of-service attack -
It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .
The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .
In case of the distributed denial-of-service attack , the flooding is done by many different sources .
Hence , from the given scenario of the question ,
The correct answer is denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .
Ответ:
d
Explanation:
Decimal equivalent of "D" = (D) 13 × 16^1