1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
10 months ago
5

attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to

determine whether or not a filtering device is in place?
Computers and Technology
1 answer:
bogdanovich [222]10 months ago
3 0

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

You might be interested in
Graphs and charts are two different elements. True or False
Aliun [14]

Answer:

False

Explanation:

Charts are often used to ease understanding of large quantities of data and the relationships between parts of the data. Charts can usually be read more quickly than the raw data.

Graphs are a common method to visually illustrate relationships in the data. The purpose of a graph is to present data that are too numerous or complicated to be described adequately in the text and in less space. ... It is important to provide a clear and descriptive legend for each graph.

7 0
3 years ago
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
Rina8888 [55]

Answer:

A. Request timeout.

Explanation:

The end devices like the computer systems in a network seeks to share resources with one another and/ or request resources from central server.

With this, there are two ways computers in a network can communicate. They are peer to peer network communication and client-server network communication.

The client-server communication requires a dedicated central server where computers in the network require data. Peer to peer describes a network where computers serve as both client and server to each other.

Request timeout is a message sent to a source when the time to live period (TTL) of a packet expires.

6 0
3 years ago
how do I delete my brainly account, my child signed up for it and nothing has been paid but I do not want the account to exist a
tatiyna
brainly.com/%2Fusers%2Fprofile?cb=1626465788976

sign in > preferences > privacy >i want to delete my account (if on a smart phone you may have to slide page to see the delete button)
4 0
2 years ago
Read 2 more answers
Why are online payment services necessary?
wel
That correct answer would be B
4 0
2 years ago
Read 2 more answers
When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
Karolina [17]

Answer:b)Recognition

Explanation: Recognition method is the technique which is based upon the similarity of the structure.It basically compares between the received format and the format of the reference on the basis of their structure.It is considered as a good method of the retrieving the image or format which is in storage. This usually results in opting the correct answer or option.

Therefore, the correct answer is option (b).

8 0
2 years ago
Other questions:
  • When selecting current page from the print range, on the print dialong box it will print
    5·1 answer
  • How does the mantle interact with the tectonic plates at a convergent boundary?
    14·2 answers
  • Select the correct answer.
    10·2 answers
  • In Windows Vista, which button is used to create a new folder?
    7·1 answer
  • The number of pixels displayed on the screen is known as ________.
    13·1 answer
  • Who invented the Bluetooth device​
    12·1 answer
  • A typical day in programming and software development would involve
    7·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
  • Write algorithm and flowchart for the following<br>a.find the sum and average of any four numbers ​
    9·1 answer
  • What are some of the characteristics found in an editorial photograph?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!