1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
3 years ago
14

Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network

mapping vulnerability testing?
Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
7 0

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
You might be interested in
How do you measure the capacity of speed and memory of computer system<br>Explain.​
jeka94
Im sorry i just need points
3 0
3 years ago
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he se
postnew [5]

Answer:

Volatile memory analysis

Explanation:

volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory

6 0
2 years ago
Which of te following ranges of cells is correctly named
Natasha_Volkova [10]
D it is because its .a5.g1
3 0
3 years ago
I still need help, thank you! Will give Brainliest ​
wlad13 [49]

Answer: 1 what do u think to help u

6 0
2 years ago
What are your thoughts on the last nintendo direct
allsm [11]

Answer:

I don't know? How do you feel about them?

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • What computer has best software
    5·1 answer
  • In your memo, give three new employees directions for starting the computer and opening a word-processing document.
    9·1 answer
  • 5. Tricks of the language commercials use are called Rhetorical Devices?
    9·1 answer
  • Text can be easily moved from one location to another using _____.
    15·1 answer
  • What will be the output after the following code is executed? def pass_it(x, y): z = y**x return(z) num1 = 3 num2 = 4 answer = p
    7·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • How to change color of object in photoshop?
    10·2 answers
  • You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remo
    13·1 answer
  • What are the common camera hazards? When might you encounter these hazards in your life, and what do you plan to
    14·1 answer
  • In Python which is the correct method to load a module math?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!