1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
7

A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an

d client software. _________________________
Computers and Technology
1 answer:
Tom [10]3 years ago
5 0

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

You might be interested in
While reading difficult content, you should always start witha.Surveying the chapterc.Reading the chapterb.Defining vocabulary w
katrin [286]
When reading difficult content you should- Survey the chapter.

Surveying the chapter allows you to better interpret the literary text and therefore be able to answer the following questions or summarize. 

Hope I helped,
-CSX :)
5 0
3 years ago
Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
Mrrafil [7]

Answer:

Coordinating, monitoring, and allocating database administration resources

Explanation:

people and data. Defining goals and formulating strategic plans for the database administration function.

Separate database servers and web servers.  

Use web application and database firewalls.  

Secure database user access.  

Regularly update your operating system and patches.  

Audit and continuously monitor database activity.  

Test your database security.  

Encrypt data and backups.

The DBA are responsible to authorizing access the database, coordinate and monitor, and acquiring software/ hardware resources. The database designers are responsible to identify the data that to be stored in the database and choose suitable structures to store this data.

Software installation and Maintenance.

Data Extraction, Transformation, and Loading.

Specialized Data Handling.

Database Backup and Recovery.

Security.

Authentication.

Capacity Planning.

Performance Monitoring.

7 0
3 years ago
Suppose you want to use an Internet cafe to login to your personal account on a bank web site, but you suspect that the computer
kupik [55]

Answer:

Copy and paste the needed information from text editor to clipboard then to the web browser.

Explanation:

The keylogging software is an application that can connect to the keyboard API through software APIs or could be kernel based or hypervisor based, JavaScript based etc, to capture keyboard events.

It records these events which makes this tool useful for attackers in networks. So long as the clipboard logging or screen logging does not accompany the keyboard loggers, data can be copied on clipboard and pasted to the target point.

8 0
3 years ago
Why would a user want to compress a large file before sending it as an email attachment?
Afina-wow [57]

to reduce the file size of the attachment

7 0
3 years ago
Read 2 more answers
Two functions of the UPS​
Angelina_Jolie [31]

Answer:

UPS is abbreviation of Uninterrupted power supply. It is a battery backup devices useful when major supply is interrupted due to any reason.

It performs the following functions:

1. It provides protection from power surges.

2. Smooth out noisy power sources

5 0
3 years ago
Read 2 more answers
Other questions:
  • Who are the founders of video-sharing site Dailymotion?
    7·1 answer
  • The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc
    6·1 answer
  • A storyboard is an example of an implementation tool.<br><br> A.<br> True<br><br> B.<br> False
    8·2 answers
  • How do you think computers have helped to improve documentation, support and services within the healthcare industry.
    7·1 answer
  • Semiconductor memory is used mainly for primary storage even with its high cost. In another hand, the magnetic tape is the cheap
    9·2 answers
  • A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistak
    15·1 answer
  • What is a short sequence of characters that appears at the end of a filename and is preceded by a period called __________
    5·1 answer
  • Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
    12·1 answer
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • There are parallels between the trust models in Kerberos and Public Key Infrastructure (PKI). When we compare them side by side,
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!