1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergejj [24]
3 years ago
10

What is the nmap command line syntax for running an ms08-067 vulnerability scan against 172.30.0.30 (targetwindows04)?

Computers and Technology
1 answer:
IceJOKER [234]3 years ago
6 0

The command line syntax is

nmap –script=smb-check-vulns –script-arg=unsafe=1 -p445 172.30.0.30

You might be interested in
This is your code.
lubasha [3.4K]

Answer:

35

Explanation:

We will be going inside B array, because he was in second place in array E,and will be the first element of array B, so it's 35

E can be understanded as:

E=[[21, 'dog', 'red'],[35, 'cat', 'blue'],[12, 'fish', 'green']], so, you can see array E as array of arrays or so-called two-dimensional array

6 0
2 years ago
c++ 2.30 LAB: Phone number breakdown Given a long long integer representing a 10-digit phone number, output the area code, prefi
Nady [450]

Answer:

#include <iostream>

using namespace std;

int main()

{

   //declare variable to store phone numbers,its area code, prefix and line number.

   long phone_number;

   int area_code, prefix,line_number;

   cout<<"Enter 10-digit phone number:"<<endl;

   //input 10-digit phone number

   cin>>phone_number;

   //logic to find area_code, prefix, and line_number.

   area_code = phone_number/10000000;

   prefix = (phone_number/10000)%1000;

   line_number = phone_number%10000;

   //output phone number in asked format.

   cout<<area_code<<"-"<<prefix<<"-"<<line_number<<endl;

   return 0;

}

Output:

Enter 10-digit phone number:

8005551212

800-555-1212

Explanation:

In the above program 10 digit phone number entered by user will be stored in the variable phone_number.

Then using this phone_number variable area_code, prefix, and line number are calculated using the following logic:

area_code = phone_number/10000000;

prefix = (phone_number/10000)%1000;

line_number = phone_number%10000;

Finally these area_code, prefix, and line_number are displayed with hyphen in between using cout statement.

5 0
3 years ago
Which of the following is not one of the steps a company would take in an attempt to prevent a malfunction or failure of their p
bulgar [2K]

Answer:

A overdesign

Explanation:

7 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Gwen has a photo she’d like to display in her speech, but she forgot to digitize it. She only has a hard copy, and she doesn’t h
skelet666 [1.2K]

Answer:

A. Document camera

Explanation:

Document cameras, which are also known as visual presenters or visualisers, digital overheads, or docucams. They are real-time image capture devices for displaying an object to a large audience. Just like an opaque projector, a document camera is able to magnify and project the images of actual, three-dimensional objects, as well as transparencies. They are, simply put, high resolution web cams, that is mounted on arms so as to facilitate their placement over a page.

This makes it easier and convenient for a teacher, lecturer or presenter to write on a sheet of paper or to display a two or three-dimensional object while the audience watches.

In Theory, the document camera can be used to display all objects.

Gwen only needs to place her photo under a document camera and deliver her speech while the image will be displayed for the class.

5 0
3 years ago
Other questions:
  • Periodically adding, changing and deleting file records is called file. A) Updating B) Upgrading C) Restructuring D) Renewing E)
    10·2 answers
  • A web ______ is a computer that delivers requested webpages to your computer or mobile device.
    7·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • What was the process called that required the photographer to have a tent or darkroom handy so that chemicals could be mixed qui
    7·1 answer
  • What are personal skills?
    5·1 answer
  • To more easily incorporate methods into a program, it is common practice to store methods in their own classes and files. Then y
    6·1 answer
  • Which of the following is not a type of bank?
    5·2 answers
  • They are correct? thank you!
    6·2 answers
  • How do I go to files in Brainly I need help
    13·1 answer
  • What are the challenges of Cyber Law???? Needed ASAP ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!