1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
1 year ago
7

charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes a

nd repairs security issues found. which kind of scanning best describes charles' requirements?
Computers and Technology
1 answer:
finlep [7]1 year ago
6 0

Charles, a security analyst, needs to check his network for vulnerabilities. he wants a scan that interacts with network nodes and repairs security issues found. The kind of scanning that best describes Charles's requirements is: Active scanning.

<h3>Who is a Security Analyst?</h3>

A Security Analyst's responsibilities include the following:

Define, plan, execute, maintain, and improve security measures, policies, and controls. Writing reports and offering insights on the effectiveness of current security policies, incident response plans, disaster recovery plans, and other security-related information

Active scanning is a scanning approach that involves scanning individual endpoints in an IT network in order to retrieve more specific information.

Learn more about Security Analysts:
brainly.com/question/16354463
#SPJ1

You might be interested in
The number of output for a decoder if the input is 4
WINSTONCH [101]
To get the number ot decoder output:

2^n; where n is number of input
2^4
2 × 2 × 2 × 2 = 16 outputs

3 0
3 years ago
CORRECT ANSWER GETS BRAINLIEST PLEASE HELP !
KIM [24]

Answer:

Mediator

Explanation:

A mediator is a person that tries to reserve peace within groups, and they often try to prevent conflict.

4 0
2 years ago
Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself
vitfil [10]

Answer:

A how I feel about myself

Explanation:

Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.

8 0
3 years ago
At what two layers of the osi model are lan and wan protocols likely to differ??
Anuta_ua [19.1K]
A LAN is connecting two or more computers to form a cable network between them.
<span>A WAN is connecting two or more computers over a broad area to form a cable network between them.</span>
5 0
3 years ago
Given an alphabet, print all the alphabets up to and including the given alphabet.
anastassius [24]

Answer:

Explanation:

public void printAlphabets(char c){

    String capitals = "ABCDEFGHIJKLMNOPQRSTUVWXYZ";

    String small = "abcdefghijklmnopqrstuvwxyz";

    if(capitals.contains(""+c)){

        for(int i=0; i<capitals.length();i++){

            if (capitals.charAt(i)!=c)

                System.out.print(capitals.charAt(i)+" ");

            else

                break;

        }// end for

        System.out.print(c);

    }else if (small.contains(""+c)){

        for(int i=0; i<small.length();i++){

            if (small.charAt(i)!=c)

                System.out.print(small.charAt(i)+" ");

            else

                break;

        }// end for

        System.out.print(c);

    }// end else if

}// end printAlphabets method

5 0
3 years ago
Read 2 more answers
Other questions:
  • 4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think
    5·1 answer
  • What country is now the number one source of attack traffic?
    5·1 answer
  • As a bank employee, you often work from home and remotely access a file server on the bank’s network to correct errors in financ
    8·1 answer
  • What are new technologies, products, or services that eventually surpass the existing dominant technology or product in a market
    14·1 answer
  • What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?
    11·2 answers
  • Which of these is an example of gathering secondary data?
    15·1 answer
  • What is the result of expression 15 &gt; 10 &gt; 5 in C? What is the result of the same expression in Java?
    14·1 answer
  • Write a python application that allows a user to enter any number of student test scores until the user enters 999. If the score
    14·1 answer
  • You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
    9·1 answer
  • Que compone una maquina Rube Goldberg (operadores mecánicos- maquinas simples – mecanismos)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!