1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lorasvet [3.4K]
3 years ago
7

A(n) monitoring vulnerability scanner is one that listens in on the network and determines vulnerable versions of both server an

d client software. _________________________
Computers and Technology
1 answer:
Tom [10]3 years ago
5 0

Answer: Passive

Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .

It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.

You might be interested in
Add three methods to the Student class that compare twoStudent objects. One method (__eq__) should test for equality. A second m
shusha [124]

Answer:

class Student(object):

def __init__(self, name, number):

self.name = name

self.scores = []

for count in range(number):

self.scores.append(0)

 

def getName(self):

 

return self.name

 

def setScore(self, i, score):

 

self.scores[i - 1] = score

 

def getScore(self, i):

 

return self.scores[i - 1]

 

def getAverage(self):

 

return sum(self.scores) / len(self._scores)

 

def getHighScore(self):

 

return max(self.scores)

def __eq__(self,student):

return self.name == student.name

 

def __ge__(self,student):

return self.name == student.name or self.name>student.name

 

def __lt__(self,student):

return self.name<student.name

 

def __str__(self):

return "Name: " + self.name + "\nScores: " + \

" ".join(map(str, self.scores))

 

 

def main():

student = Student("Ken", 5)

print(student)

for i in range(1, 6):

student.setScore(i, 100)

print(student)

 

print("\nSecond student")

student2 = Student("Ken", 5)

print(student2)

 

print("\nThird student")

student3 = Student("Amit", 5)

print(student3)

 

print("\nChecking equal student1 and student 2")

print(student.__eq__(student2))

 

print("\nChecking equal student1 and student 3")

print(student.__eq__(student3))

 

print("\nChecking greater than equal student1 and student 3")

print(student.__ge__(student3))

 

print("\nChecking less than student1 and student 3")

print(student.__lt__(student3))

if __name__ == "__main__":

5 0
3 years ago
Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to conn
Bumek [7]

Answer:

Windows 8.1 Core

Explanation:

In this particular example, we're going to use Windows 8.1 Core, is the most basic of the window's family, in this case, only we need an OS to connect the hardware with the cloud computing for security and is not necessary another license, in addition, Windows 8.1 core is easiest to use, is so friendly with the user.

6 0
2 years ago
Que implicaciones sociales puede tener la robótica
wolverine [178]
Según estos estudios, el impacto de los robots en la productividad ya se compara con la contribución de las máquinas de vapor en el pasado. ... Algunos de los aumentos en la productividad que se derivan de la densificación de los robots se comparten con los trabajadores mediante el pago de salarios más altos.
8 0
2 years ago
If an attacker purchases and uses a URL that is similar in spelling and looks like a well-known website in order for the attacke
Mice21 [21]

Answer:

URL hijacking

Explanation:

Based on the information provided within the question it can be said that in this scenario they seem to be using an attack known as URL hijacking. This attack, also known as "typosquatting", is when someone takes advantage of individual's typos when searching for popular sites, in order to get them to go to their site which generates them money the more traffic they get.

5 0
3 years ago
The computer mouse is used to
galben [10]
The answer is C , what else would you do with the mouse?
6 0
3 years ago
Other questions:
  • HELP PLEASE
    7·2 answers
  • A company ABC asked you to design a simple payroll program that calculates and employee's weekly gross pay, including any overti
    9·1 answer
  • What should be included as part of the approval process? in relation to computer forensics
    14·1 answer
  • In a system using the relocatable dynamic partitions scheme, given the following situation (and using decimal form): Job Q is lo
    5·1 answer
  • Design and write a class that implements an ordered list type using a linked list, and a program that exercises and tests the cl
    7·1 answer
  • True / False<br> The exponent in floating point is stored as a biased value.
    9·1 answer
  • What are the modes of operation of WLANs?
    5·1 answer
  • How can you enter Task Manager in Windows? Select 3 options. press Ctrl + Shift + Tab press Ctrl+Alt+Delete and then click Task
    8·1 answer
  • a marketing company is setting up a new office in the city. which type of contract should they sign for periodic maintenance of
    15·1 answer
  • What is the value of creating recurring tasks?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!