answersLogoWhite

0


Best Answer

DDoS

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

12y ago

An orgy

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: An attacker sends a large number of requests to a server from several computers that are located at different geographical locations What is the name for this type of attack?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What attacks come from multiple sources instead of a single source?

Attacks from a single source can be easily defeated with an IP block. Thousands of different IPs make this a much more difficult attack to stop.More sources means more computers. More computers means more computing power. This is especially useful for DoS attacks, where the more requests you can send out the better your attack is.It's much harder to find the original source of an attacker when there are many attacks from different physical locations.


What is vulneratibily?

Vunerability in the context of computers generally means that there is a weak spot in the security of the computer that could let an attacker gain access to your machine.


Where can someone find videos instructing them about disarming an attacker?

One can find videos instructing them about disarming an attacker on several different online video websites. By far the most popular option would be YouTube, where one can find several different videos by different instructors.


What is the Tamil meaning for Attacker?

The Tamil word for "Attacker" is தீவாதி.


If two students connect their computers with a twisted pair network-cable directly between the computers Would it be possible for an attacker to see the files being transferred?

If computers are not connected to the internet at the same time over another cable or wireless, no it is not possible to see the data being transferred


What is correct a horse outruns an attacker or outrun an attacker?

The correct way would be 'a horse outruns an attacker', singlular horse, present tense.


How does the wasp protect itself from its enemies?

With it's stinger, it strikes the attacker and releases venom into the attacker. The stinger is left in the attacker and soon, it dies.


What is a man-in-the-middle attack in regards to computers?

The man-in-the-middle attack is cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.


What stings an attacker with paralyzing poison?

A Scorpion stings an attacker with paralyzing poison


What story does the attacker tell Santiago?

In the Alchemist What story does the attacker tell Santiago


Which pre-hacking phase could be accomplished without the attacker ever connecting to the target network?

Foot-printing is the pre-hacking phase that could be accomplished without the attacker ever connecting to the target network.


Does the offside rule give the benefit of the doubt to the attacker or defender?

should be the attacker but usually the defender