You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring

Answers

Answer 1

Answer:

It seems as though it would be a DDoS attack.

Explanation:

The characteristics are as follows:

A slow down of operations and attempting to get access into said service.


Related Questions

Ricard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages. The use of these codes in this context indicates that Ricard understands:

Answers

Answer: pragmatics

Explanation:

Pragmatics simply means the study of how words are used. It's the study of signs and symbols. Pragmatics includes speech acts, implicature, and conversation.

Since Richard, a sixth-grader, uses codes such as LOL, TTYL, and 411 in his text messages, then the use of these codes in this context indicates that Ricard understands pragmatics.

One property of light that makes it possible to record the image of an object with the camera

Answers

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False

PLEASEE HELP

Answers

Answer:

false , those are called passive railways

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

Discuss the entity integrity and referential integrity constraints. Why is each considered important

Answers

Answer:

Referential integrity, is the condition with the rule that foreign key values are always valid, and it is founded on entity integrity. Entity integrity, makes certain, the condition that there is a unique non-null primary key for every entity. The parent key functions as the source of the unique identifier for a set of relationships of an entity in the referential constraint parent table, and defining the parent key is known as entity integrity

Explanation:

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files

Answers

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

While these two approaches have similarities in terms of the topics they address, __________ covers broad IT management topics and specifies which security controls and management need to be in place, while __________ goes into more detail on how to implement controls but is less specific about the broader IT management over the controls.

Answers

Answer:

COBIT, ISO

Explanation:

COBIT(control objectives and international and related information technology) is a framework created by ITGA(information technology governance institute) and ISACA. This framework is a guide for IT professionals and business executives in creating and managing IT controls and objectives. It aims to provide uniformity for purpose of aiding easy communication and IT auditing across organizations. It is broadly for IT management goals and processes.

While ISO( international standards organization) is a Non governmental organization that provides standards for specific IT products and systems and not specifically concerned about the general IT management procesd

please answer me fast ​

Answers

Answer:

Btp

Explanation:

this will help you more

Answer:

BTP is the simplest and the most conventional model of topology

PTP

BTP✓✓✓

PTB

PTT

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

Which is the most viewed vdo in YT ever?​

Answers

“Baby Shark Dance” by Pinkfong Kids' Songs & Stories (8.44bn views)
“Despacito” by Luis Fonsi, featuring Daddy Yankee (7.32bn views) ...
“Shape of You” by Ed Sheeran (5.29bn views) ...
“Johny Johny Yes Papa” by LooLoo Kids (5.24bn views) ...

People think that they can send email messages from their personal computers and that it cannot be traced. This is called the _____.

Answers

Message Trace

Essentially it's a method used by administrators to monitor and trace emails

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit

Answers

Answer:

total = 0

for i = 1 to 7

input temp

temp = temp * 1.8 + 32

total + = temp

average = total/7

print average

Explanation:

[Initialize total to 0]

total = 0

[Iterate from 1 to 7]

for i = 1 to 7

[Get input for temperature]

input temp

[Convert to degree Fahrenheit]

temp = temp * 1.8 + 32

[Calculate total]

total + = temp

[Calculate average]

average = total/7

[Print average]

print average

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

I m a rectangle in a flow chart? What do I represent?

Answers

Answer:

It represents processing box

your organization has multiple remote offices. the users at the remote office often remotely connect to the application servers. which of the protocols should you enforce for encrypted communicationa

Answers

Answer:

RDP

SSH

Explanation:

RDP and SSH can both be used for remote encrypted communication. RDP protocol( called remote desktop protocol) is owned by Microsoft. It allows it's user access to the network through a GUI RDP software that allows you to connect to another computer on the network, the client server. RDPs operate over encrypted channels and is therefore secure.

SSH(called secure shell protocol) is used on Unix like OS systems to connect over unsecured network. SSH uses cryptographic encryption that increases security for it's client-server architecture. It's an improved version of RSH and Telnet which didn't make use of encryption when sending data over the network.

A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

Answer please in order

Answers

Answer:

analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.

Explanation:

Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.

Generally, it travels faster through solids than it does through either liquids or gases.

Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

True or False? Using your traffic analytics report, you can see the source of traffic to your website

Answers

Answer:

True

Explanation:

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Answers

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

What is the reporting library? A resource that offers dozens of canned reports built around marketing best practices A reporting add-on feature you can buy for an additional $300 a month Dozens of canned reports that help you dig a little deeper into your data — only currently available to HubSpot Admins The section of your public library where HubSpot developers sit when creating the HubSpot reporting tools

Answers

Answer:

A resource that offers dozens of canned reports built around marketing best practices

Explanation:

Report library is a resource within HubSpot that stores reports in standard formats which a user can save to her or his list of reports and which can also be added to the users dashboards.

The topics handled by each report are based on best practices, including sales metrics, and the performance of websites, and there are dozens of reports within the library to choose from

Therefore, the reporting library is a resource that offers dozens of canned reports built around marketing best practices

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

what is microsoft speadsheet

Answers

Answer:

Exel if I spelled it right

Explanation: It is very good

Answer:

It's called Excel and it's in Office 365

Explanation:

It's very useful in my opinion to organize any graphs or information you would like to store online.

What is the Role of an algorithm?

Answers

Answer:

Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.

pls Mark me as brainliest trust me

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

Other Questions
If the radius of curvature of a mirror is 15m and the distance of the object from the mirror is 10m. Find the distance of the image from the mirror and the magnification of the object in meter With so many workers habituated to using mobile devices for so much of their work, should company management develop apps for influencing subordinates? Explain your reasoning. Evaluate 19C1 PLEASE HELP An unwary football player collides with a padded goalpost while running at a velocity of 7.50 m/s and comes to a full stop after compressing the padding and his body 0.350 m. (a) What is his deceleration 10 points!!!!!:)Describe the graph of the function. [tex]y = \sqrt{x + 3} [/tex]a). the graph is a radical function y=sqrt(x) shifted 3 units right.b). the graph is a radical function y=sqrt(x) 3 units left.c). the graph is of exponential growth.d). the graph is an absolute value function with vertex (-3,0).pls help me:). What number, divided by 3/7 , will result in a value of 2 1/3? Marlow Company purchased a point of sale system on January 1 for $6,500. This system has a useful life of 5 years and a salvage value of $950. What would be the depreciation expense for the second year of its useful life using the double-declining-balance method You are charged $9.33 total for a meal, assume the 7% sales tax, how much was the menu price of this item?I have already tried$8.68$8.71$8.67 all were wrong How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once. write the equation of the line shown in the graph above in slope-intercept form All of the following are examples of geological features EXCEPTridgesvalleysbridgeswaterfalls Which describes an atom that has fewer neutrons than protons and more electrons than protons?negative compoundpositive compoundpositive ionnegative ion 4. Who gets credit for the modern definition of Afrocentricity? Which part of this excerpt from William Shakespeare's Macbeth uses apostrophe? if$3=2 and Rs. 325=$3, how many pound() will be equal to Rs. 39000 U have to work out the value of a by the way the ability of organism to sense changes in its body is an example of Read this excerpt from the US Constitution. Which portion of the text contains Voltaire's views on the freedom of worship?We the People of the United States, in order to form a more perfect Union, establish justice, insure domestic Tranquility, provide for the commondefence, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitutifor the United States of America.Article. I.Section. 1.All legislative Powers herein granted shall be vested in a Congress of the United States, which shall consist of a Senate and House ofRepresentatives.Amendment1Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof, or abridging the freedom of speechor of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. Which number line represents the solutions to -2x = -6? It be Antons car. I saw him driving the car yesterday. ( Put the correct models verb)