1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
3 years ago
9

_________ is the process of scanning the network to find out which Internet Protocol (IP) addresses are attached to potentially

vulnerable resources such as Web servers or database servers. Hardening Intrusive testing Host discovery Nonintrusive testing
Computers and Technology
1 answer:
andre [41]3 years ago
5 0

Answer:

Host discovery

Explanation:

Hot discovery is one of the preliminary stages of network reconnaissance, it begins with different IP addresses that belongs to a particular network and adopts various methods to scan and know if a host is at the IP address. Host discovery is also known as ping scan when a sonar analogy is used.

Host discovery helps to scan the particular type of host on one's network.

You might be interested in
RDBMSs enforce integrity rules automatically. <br> a. True<br> b. False
IRINA_888 [86]

It is true. RDBMS enforce integrity rules automatically. Integrity rules are automatically enforced by RDBMSs.

Integrity rules are automatically enforced by RDBMSs. Because it contains the design choices made regarding tables and their structures, a data dictionary is frequently referred to as "the database designer's database." Any character or symbol intended for mathematical manipulation may be contained in character data.

Data points that are connected to one another are stored and accessible in a relational database, which is a form of database. The relational model, an easy-to-understand method of representing data in tables, is the foundation of RDBMS. Each table row in a relational database is a record with a distinct ID known as the key.

It is simple to determine the associations between data points because the table's columns carry the properties of the data and each record typically has a value for each property.

To know more about RDBMS click on the link:

brainly.com/question/13326182

#SPJ4

8 0
1 year ago
An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in
sammy [17]

Answer:

b. The names in the list should be in alphabetical order.

Explanation:

A binary search is an algorithm used for searching for an item in a list or array. The algorithm first sorts the data structure into order and then divides it into halves. If the searched item is less than the middle item in the list, then the algorithm searches for the target in the first half, else, in the second half. This reduces the time complexity of the search.

5 0
3 years ago
Which of the following describes the test phase of the program process
wlad13 [49]

Program testing is an evaluative process which is also called Unit Testing by the programmers.

Explanation:

Software testing is an important step in the software development process. The procedure analyzes the functionality of it and if it meets the specified requirements or not. This is a four-stage procedure that involves analysis, planning, development, setting the test environment, and finally the execution of the test.

The main stages of testing that will result in an error-free and quality product are-  

  1. Unit testing
  2. Integration testing
  3. System testing
  4. Acceptance testing

3 0
3 years ago
How do i win Mine Craft
Vlad [161]
Answer: defeat the dragon? I think
3 0
3 years ago
Read 2 more answers
2.3.2 Internet Safety
REY [17]

Answer:

False

Explanation:

There are also hackers online

5 0
3 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • A parameter is a numerical measure that describes a characteristic of a sample. Choose One • 4 points True False
    6·1 answer
  • File-sharing programs such as Napster, Kazaa, and iMesh make it possible for individuals to exchange music files over the Intern
    7·1 answer
  • An application programming interface (API) is ________. Select one: A. the code to interface between an application and RAM B. t
    15·1 answer
  • A prime number is an integer that is divisible only by 1 and by itself. Write a program that: 1. Takes a number as an input. 2.
    5·1 answer
  • Creating an accurate inventory is a challenge, given the speed at which data files are created, deleted, moved, and changed. It
    12·1 answer
  • When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s
    14·1 answer
  • In java please
    13·1 answer
  • Why is dark supereffective against ghost?
    5·2 answers
  • Why are people's visions of utopias and dystopias subjective?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!