1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
3 years ago
9

_________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially

vulnerable resources such as Web servers or database servers. Hardening Intrusive testing Host discovery Nonintrusive testing
Computers and Technology
1 answer:
andre [41]3 years ago
5 0

Answer:

Host discovery

Explanation:

Hot discovery is one of the preliminary stages of network reconnaissance, it begins with different IP addresses that belongs to a particular network and adopts various methods to scan and know if a host is at the IP address. Host discovery is also known as ping scan when a sonar analogy is used.

Host discovery helps to scan the particular type of host on one's network.

You might be interested in
(tco 7) the asp.net ajax client-side framework is loaded on the _____ for an asp.net web application.
jok3333 [9.3K]

a client-side framework is loaded on the client side, ie., the browser.

4 0
3 years ago
Difference between desktop, web and mobile apps
Lyrx [107]

there are many differences, but the most prominent are that they have different apis (aplication programing interface) and different architecture

also mobile apps tend to use less system resources and are more regulated by services like the google play store, opposed to the fairly unregulated uwp platform used by most windows machines.  


4 0
4 years ago
Besides the decimal number system that is most common (base 10), two other number systems that can be used in c++ programs are _
Paha777 [63]

Answer:

Binary number system

ASCII number system

Explanation:

C++ uses binary number system to define machine level language of the code written in high level languages and ASCII system to define the characters on key board for background low level coding an thus each character on the keyboard has a number associated with it to define it uniquely.

7 0
3 years ago
Luckas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead o
irakobra [83]

Explanation:

highlight, correct format and click ok

3 0
3 years ago
Senioritis usually affects which of the following groups the most?
Dovator [93]
Generally we'd need "the following" if the question asks about it. Senioritis usually affects high school seniors IIRC.
6 0
3 years ago
Other questions:
  • Building relationships during your career exploration is called?
    5·1 answer
  • Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
    10·1 answer
  • An undesirable jagged appearance is referred to as
    7·2 answers
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    9·1 answer
  • An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
    13·1 answer
  • In needs analysis: Group of answer choices the costs of different physical network design alternatives are assessed the rate of
    10·1 answer
  • A short-range wireless network is called:
    10·1 answer
  • ANSWER ASAP!!!!!!!!!!!!!
    7·2 answers
  • A customer in Lowe's needs help. Matt works in shipping and receiving. It isn't Matt job to work with the customer, but he knows
    15·2 answers
  • in the topology configuration, hosts are connected to each other through a central controller which assumes all responsibility f
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!