1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
14

Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network

mapping vulnerability testing?
Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
7 0

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
You might be interested in
Making the data impossible to recover even by applying physical forensics methods is known as __________ of media.
madam [21]

Answer:

Anti-Forensic Techniques.

Explanation:

Anti-Forensic Techniques are thsoe techniques used to deviate the Forensic tools by injecting fake informations, hiding information, planting bugs, editing or erasing information, rendering it impossible to recover the data. It is a criminal way of hacking approach that restrains Forensics to find the hackers.

Anti-Forensic tools and techniques works in oppose to the Forensic tools and techniques that tries to recover the data, locate the hacker.

Thus the correct answer is anti-forensic techniques.

3 0
3 years ago
Assume the availability of a function named oneMore. This function receives an integer and returns one more than its parameter.
jek_recluse [69]

Answer:

oneMore(oneMore(oneMore(oneMore(oneMore(0)))))

Explanation:

  • As a function has been explained which when given an integer results as a next integer. oneMore(given-integer)= next integer
  • As we are restricted to use 0 only and can't use operators like + - * /.
  • We have to obtain a value 5
  • So doing step-by-step:

             (oneMore(0))=1

             (oneMore(oneMore(0)))=2

             (oneMore(oneMore(oneMore(0))))=3

             (oneMore(oneMore(oneMore(oneMore(0)))))=4

             oneMore(oneMore(oneMore(oneMore(oneMore(0)))))=5

7 0
3 years ago
What acts as a platform on which application software runs?
Readme [11.4K]
A computing platform
5 0
3 years ago
What is the effect of this program?
Mrac [35]

Answer:

The answer is (C)

Let’s run the algorithm on a small input to see the working process.

Let say we have an array {3, 4, 1, 5, 2, 7, 6}. MAX = 7

  • Now for i=0,  i < 7/2, here we exchange the value at ith index with value at (MAX-i-1)th index.
  • So the array becomes {6, 4, 1,  5, 2, 7, 3}. //value at 0th index =3 and value at (7-0-1)th index is 6.
  • Then for i=1, i < 7/2, the value at index 1 and (7-1-1)=5 are swapped.
  • So the array becomes {6, 7, 1,  5, 2, 4, 3}.
  • Then for i=2, i < 7/2, the value at index 2 and (7-2-1)=4 are swapped.
  • So the array becomes {6, 7, 2,  5, 1, 4, 3}.
  • Then for i=3, i not < 7/2, so stop here.
  • Now the current array is {6, 7, 2,  5, 1, 4, 3} and the previous array was{3, 4, 1, 5, 2, 7, 6}.

Explanation:

So from the above execution, we got that the program reverses the numbers stored in the array.

8 0
3 years ago
Where is the "delete account" button in my profile? And please give me a legit answer and not just a word.
N76 [4]

Answer:

in your profile for brainley ??

3 0
3 years ago
Read 2 more answers
Other questions:
  • 7. What is the school campus’s setting<br> the school is sanford
    6·2 answers
  • What is the difference between primary storage,secondary storage and offline storage what type of storage can be
    6·2 answers
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
    8·1 answer
  • If you could make another device "smart" and have
    12·1 answer
  • Which of the following could be a constructor for the public class MyClass? a. public MyClass() b. public void MyClass() c. publ
    7·1 answer
  • Benefits of computer in bank​
    5·1 answer
  • Choose the best type of loop for each situation.
    6·1 answer
  • Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclus
    10·1 answer
  • Which is a benefit of peer-to-peer networking?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!