1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
1 year ago
5

attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to

determine whether or not a filtering device is in place?
Computers and Technology
1 answer:
bogdanovich [222]1 year ago
3 0

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

You might be interested in
The main screen of wireshark includes several shortcuts. which shortcut category displays a list of the network interfaces, or m
xeze [42]

Capture is the shortcut category which displays a list of the network interfaces, or machines, that wireshark has identified, and from which packets can be captured and analyzed.

Therefore, the answer is Capture.

3 0
3 years ago
You have just installed a SOHO router in a customer’s home and the owner has called you saying his son is complaining that Inter
emmainna [20.7K]

Answer: A. Verify the wireless connection is using the fastest wireless standard the router supports.

D. Enable QoS for the gaming applications on the router and on the son's computer.

Explanation: Verifying the wireless connection is using the fastest wireless standard the router supports will improve line of connectivity and reduce network latency hence gaming consoles communicate faster.

QoS enables the prioritizing of the volume of internet traffic on the console for high quality gaming. QoS will also enable more internet bandwidth to be channeled to the gaming console.

6 0
3 years ago
What is the primary purpose of endnotes?
mihalych1998 [28]

Answer:

They acknowledge the source of a quotation, paraphrase, or summary; and (2) They provide explanatory comments that would interrupt the flow of the main text.so its B

5 0
3 years ago
Read 2 more answers
Stella likes to work with colors and moving pictures. She is good at drawing. Which job role should she choose
PilotLPTM [1.2K]

Answer:

Digital Art or Animator for moving picture art.

Explanation:

7 0
3 years ago
Read 2 more answers
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
Other questions:
  • John would like to move from the suburbs into the city, but the rent in the city is very high. John has found an apartment he re
    13·1 answer
  • Should organizations fear websites where consumers post negative messages about products or services? What actions can companies
    12·1 answer
  • (01.03 LC)
    9·1 answer
  • In "When Is a Planet Not a Planet?" why does the author say that the outer planets are made of gas when the inner planets are ma
    5·1 answer
  • A user is trying to delete a file located on an ntfs volume on his windows 8 computer but is unable to do so. Why is this.
    5·1 answer
  • Which of the following sentences is accurate? a. PDF stands for "Proofreading Direct Files." b. PDF files cannot be edited. c. B
    9·1 answer
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • Eun-Joo is working on a circuit board. There is no electrical current flowing through a certain switch on the circuit board.
    9·2 answers
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
  • What represents a user’s specific preferences?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!