1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
8

harry is analyzing inbound network traffic and notices a tcp packet that has the FIN,PSH, and URG flags set at the same time. wh

ich type of scan is most likely occuring?
Computers and Technology
1 answer:
s344n2d4d5 [400]3 years ago
8 0

Answer:

The correct answer to the following question will be "Christmas Tree Scan".

Explanation:

Xmas scanners obtain their title from either the collection of flags switched on inside a document.

  • Such scans were intended to exploit the protocol header symbols of URG, PSH and FIN.
  • Each OS reacts differently to Xmas packages that expose accurate information including port state, and much more.

So, it's the right answer.

You might be interested in
Which programming scenario would most likely involve this array block?<br><br>SOMEONE PLEASE HELPPP​
attashe74 [19]

Answer:

answer is D

Explanation:

as the block returns the number of array members, the most likely scenario is the last one.

7 0
3 years ago
if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete
Anuta_ua [19.1K]
It would be C- crop. This allows you to specifically delete parts of the image using drag and drop features. Hope this helps!
3 0
3 years ago
Consider Ron’s budget. How much money does Ron have left over each month?
vladimir1956 [14]
What is Ron’s budget?
4 0
3 years ago
Read 2 more answers
A _____ is a control that tells the computer what task to perform.
sammy [17]
I'm pretty sure the answer is code
7 0
3 years ago
4) Short answer questions<br>c) What is Cyber Law?​
Kamila [148]

Answer:

Kindly check explanation

Explanation:

Laws refer to legal rules and regulatory framework which is used as a guiding principle to define the actions and behavior which may lead to incurring penalties if boundaries are trespassed.

The word 'Cyber' is popularly used to describe activities, actions and interactions involving the internet. With the burst and continous pace of digital transformation, the internet also called Cyberspace is in a world of its own. Hence, the creation of rules to govern internet interactions.

Cyber laws may thus be explained as codified laws which are designed and implemented to govern all forms of possible online interaction or transactions in other enhance cyber security to protect the interest of persons and data from various forms of internet threats. Cyber laws include ; Data protection laws, Computer crime laws, telecommunication laws and so on.

6 0
3 years ago
Other questions:
  • Todd, a travel agent, lost his job due to no need for his skill. This is an example of what type of unemployment?
    12·1 answer
  • Once you have selected the range of cells for your table data, from which tab can you open the Insert Table dialog box?
    6·2 answers
  • What is the main idea of this article? Please someone help me. I will give brainliest answer
    7·1 answer
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • 14<br> Select the correct answer.<br> Which activity is a marketing technique?
    9·1 answer
  • What is a way to minimize technical problems with your computer
    12·1 answer
  • What's the main piece of information you look for in an e-mail message you're investigating??
    14·2 answers
  • Why are medical coders using encoded software
    10·1 answer
  • Which line of code outputs the decimal portion of a float stored in the variable x? print (x % 1000) print (x) O print (x / 1000
    13·1 answer
  • High level languages are closer to machine language than humans yes or no​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!