1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
11

Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua

l network traffic?
a. TCP connect scanning technique
b. FIN scanning technique
c. Stealth scanning technique
Computers and Technology
1 answer:
OLEGan [10]3 years ago
6 0

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

You might be interested in
CHANGE POSITION OF SONG Enter song's current position: Enter new position for song: "Peg" moved to position 3 JAMZ PLAYLIST MENU
hichkok12 [17]

Answer:

Answers can be found below

Explanation:

port java.util.Scanner;

public class Playlist {

String title;

SongEntry head;

public Playlist(String title) {

this.title = title;

this.head = null;

}

public static void main(String[] args) {

Scanner scanner = new Scanner(System.in);

System.out.println("Enter the playlist's title:");

String title = scanner.nextLine();

Playlist playList = new Playlist(title);

String option;

do {

option = playList.printMenu(scanner);

switch (option) {

case "a":

playList.addSong(scanner);

break;

case "d":

playList.removeSong(scanner);

break;

case "c":

playList.changePosition(scanner);

break;

case "s":

playList.outputSongByArtist(scanner);

break;

case "t":

playList.outpuTotalTime();

break;

case "o":

playList.outputFullPlayList();

break;

case "q":

System.out.println("QUIT");

break;

default:

System.out.println("please enter a valid option");

}

} while (!option.equals("q"));

}

public String printMenu(Scanner scanner) {

System.out.println(this.title + " PLAYLIST MENU");

System.out.println("a - Add song");

System.out.println("d - Remove song");

System.out.println("c - Change position of song");

System.out.println("s - Output songs by specific artist");

System.out.println("t - Output total time of playlist (in seconds)");

System.out.println("o - Output full playlist");

System.out.println("q - Quit");

System.out.println("Choose an option:");

String input = scanner.nextLine();

return input;

}

public void outputFullPlayList() {

if (head == null) {

System.out.println("Playlist is empty");

} else {

SongEntry tempNode = head;

while (tempNode != null) {

tempNode.printPlaylistSongs();

tempNode = tempNode.getNextNode();

}

}

}

public void addSong(Scanner scanner) {

System.out.println("ADD SONG");

System.out.println("Enter song's unique ID:");

String uniqueId = scanner.nextLine();

System.out.println("Enter song's name:");

String songName = scanner.nextLine();

System.out.println("Enter artist's name:");

String artistName = scanner.nextLine();

System.out.println("Enter song's length (in seconds):");

int length = Integer.parseInt(scanner.nextLine());

SongEntry song = new SongEntry(uniqueId, songName, artistName, length);

if (head == null) {

head = song;

} else {

SongEntry tempNode = head;

while (tempNode.getNextNode() != null) {

tempNode = tempNode.getNextNode();

}

tempNode.insertAfter(song);

}

}

public void removeSong(Scanner scanner) {

System.out.println("REMOVE SONG");

System.out.println("Enter song's unique ID:");

String uniqueId = scanner.nextLine();

SongEntry tempNode1 = head;

SongEntry tempNode2 = head;

while (tempNode1 != null) {

if (tempNode1.getUniqueID().equals(uniqueId)) {

if (tempNode1.getUniqueID().equals(head.getUniqueID())) {

6 0
3 years ago
The packets used to transmit voice on the Internet are similar to the packets that are used to send email. What are some of the
Alona [7]

Answer:

Quality of service (QOS).

Explanation:

In recent computer networking, the convergence of voice, video and text data packet has been made possible. There is no need for a dedicated network for a particular type of packet.

QOS or quality of set is a service rendered to voice or audio packets in VoIP phones to enhance communication.

The email is a digital mailing system that can be used to send all three packets. It enjoys the QOS as voice packets. It is given high preference for transmission and uses the TCP protocol to transmit data reliably.

8 0
2 years ago
Question 2 Unsaved Which of these is NOT an example of an emerging technology? Question 2 options: Sixth Sense Close Range Drone
alexandr1967 [171]

The answer is <em>B.) Close Range Drones</em>

I just took the test

3 0
3 years ago
List 7 basic internal component found in a computer tower?
NISA [10]
7 Basic Internal Component found in a computer tower:

1) Power Supply
2) Central Processing Unit (CPU)
3) Hard Disk Drive (HDD)
4) Motherboard
5) Video card
6) Random Access Memory (RAM)
7) Sound Card

*Expansion Card, Network Card, Bluetooth Card
3 0
3 years ago
Read 2 more answers
Ok so um does anyone know how i can use a divided by sign on computer?
Maslowich
You can just put “/“ to represent dividing
6 0
3 years ago
Read 2 more answers
Other questions:
  • What is authentication?
    8·1 answer
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • A customer in a store is purchasing 5 items. Write a python program that asks for the price of each item and display the subtota
    14·1 answer
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    7·1 answer
  • Which disc store compacity for full lenght movie? dvd or cd
    14·1 answer
  • What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
    6·2 answers
  • I need help with yes lol please and thank you
    15·2 answers
  • What is the role of the memory in a computer ​
    11·1 answer
  • Which operation is not efficiently supported by heaps?
    8·1 answer
  • Why should you make sure the paper being used in a printer is dry and not damp?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!