1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
7

An administrator running a port scan wants to ensure that no processes are listening on port 23. What state should the port be i

n?
open port
open address
closed address
closed port
Computers and Technology
1 answer:
a_sh-v [17]3 years ago
3 0

Answer: Closed port

Explanation:

Port 23 basically refers to the telnet which provide very severe services and it is used to access the server remotely. We should always closed the port 23, when we are not using telnet services because to prevent it from being hacked due to the port scanning.

As, now a days it is rarely used by the hackers as it is difficult to access this services from the server.

Therefore, Closed port is the correct answer.

You might be interested in
An example of software is a _____.<br><br> spreadsheet<br> mouse<br> track ball<br> printer
algol13

An example of software is a spreadsheet :)

8 0
3 years ago
The February Revolution occurred in January.<br><br><br> True<br> False
zimovet [89]
The answer would be false. 
7 0
3 years ago
Read 2 more answers
Which tool is used to create a basic web page using HTML?
GuDViN [60]

Answer:

A text editor

Explanation:

A text editor is an application that enables a programmer edit and create codes in a programming language. These codes are then executed to do just what the programmer wanted them to do.

5 0
3 years ago
Read 2 more answers
What type of storage drive contains multiple spinning platters?
Gala2k [10]

The type of storage drive that contains multiple spinning platters is called; Hard disk drives

<h3>What is the hard disk drive?</h3>

A computer hard disk drive (HDD) is a non-volatile data storage device. Non-volatile refers to storage devices that maintain stored data when turned off.

Now, the correct answer to the question is hard disk drives. This is because a hard disk drive is comprised of a stack of spinning metal disks known as platters. Each spinning disk has trillions of tiny fragments that could possibly be magnetized in order to represent bits (1s and 0s in binary code).

Read more about Hard disk drives at; brainly.com/question/24498473

#SPJ12

8 0
2 years ago
Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender
Pavlova-9 [17]

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

4 0
3 years ago
Other questions:
  • Why is it important for element IDs to have meaningful names?
    7·1 answer
  • How might your use of computers and knowledge of technology systems affect your personal and professional success?
    7·2 answers
  • ​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
    13·1 answer
  • Which of the following would be considered a primary source of information?
    6·1 answer
  • 1D Array Assignment Outcome: Student will demonstrate the ability to use a one-dimensional array. Student will demonstrate the a
    5·1 answer
  • In 4-bit sign magnitude representation, what is the binary encoding of the number -5?
    15·1 answer
  • Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a bu
    11·1 answer
  • If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All com
    15·1 answer
  • Consider the following code:
    6·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the process of casting?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!