If you experience a denial-of-service attack, you can use firewall logs to determine the _______ from which the attack originated

a. Computer operating system
b. Computer manufacturer
c. IP address
d. None of the above


Answer C. You can use the IP address information to determine who that IP address belongs to.

Computer Science & Information Technology

You might also like to view...

Over the past two years a cloud service consumers have made 24,531 attempts to invoke a cloud service’s reporting capability. Of those attempts, 22,904 resulted in the successful execution of this capability. Based on these statistics, what is the reliability rating of the cloud service’s reporting capability?

What will be an ideal response?

Computer Science & Information Technology

Aside from a live memory capture taken at the time of first response, what are two locations on a computer where copies of previous memory configurations can be found?

a. Cache b. Hybernation files c. The registry d. .DMP files

Computer Science & Information Technology

Which browser has spotty support for new color options in CSS3?

a. Firefox b. Internet Explorer c. Chrome d. Safari

Computer Science & Information Technology

All the following are reasons to collaborate online EXCEPT for:

A) a team of IT professionals living in different countries collaborating on a big project. B) several friends working on their tax returns. C) a bunch of college students working on a group project. D) small business owners presenting their products or services to potential clients.

Computer Science & Information Technology