Respuesta :
Answer:
Explanation:
See the attached image to see answer.

The number of requests he should trigger to compromise the DNS cache of the victim with given probability is; R = 1622016 requests
What is the number of protocol requests?
According to RFC 542 Protocol manual, the number of fake requests that are people to be accepted is given by;
P_s = DRW/(NPI)
Where;
D is Average number of Identical outstanding queries of a resolver
R is the number of requests triggered per second by the attacker
W is the window of opportunity in seconds
N is the number of authorized name servers for a domain
P is the number of ports used
I is the number of ID's available
According to the RFC 542 Protocol manual, we have the values;
D = 1
W = 0.1
N = 2.5
P = 1
We are given;
P_s = 99% = 0.99 and I = 65536. Thus;
R = (N*P*I*P_s)/DW
R = (2.5 * 1 * 65536 * 0.99)/(1 * 0.1)
R = 1622016 requests
Read more about protocol requests at; https://brainly.com/question/26807014