1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
11

Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua

l network traffic?
a. TCP connect scanning technique
b. FIN scanning technique
c. Stealth scanning technique
Computers and Technology
1 answer:
OLEGan [10]3 years ago
6 0

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

You might be interested in
The blank areas around the outside edges of a document are called the _____. a. settings b. margins c. blank space d. empty spac
nevsk [136]

I think it will be B margins

7 0
3 years ago
Write a program that prints to the screen all the ASCII characters from 33 to 126. 33! 34''
leonid [27]

Answer:

#include <iostream>

using namespace std;

int main() {

   for(int i=33;i<=126;i++)//Using loop to print ASCII characters.

   {

         cout<<i<<char(i<<" ";//statement to print integer and it's ASCII characters with values.

   }

return 0;

}

Explanation:

Put a closing parenthesis i char(i after doing that code will run .Since the answer was not getting posted hence i have to come to this resort.

I have used for loop for values 33 to 126 and for printing the ascii characters I have used typecasting converting the integer to corresponding char forcefully.

6 0
3 years ago
Google analytics is an example of which of the followinga) search engine
mart [117]
Google Analytics works on statistics. It allows businesses/websites to get an insight into what their customer's needs and wants are. 
Out of the answers you've given, I would say it is a site Management Tool. 

Cancelling out: (and reasons for cancelling them) 
Search Engine - Google on its own is a search engine, however, Analytics is a 'Subsidiary' if you will. 
Google Chrome is a Web Browser - Not the sector of Google Analytics. 
Security Services - It does not encrypt anything (or make anything safer for users) 


4 0
3 years ago
What is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means
sp2606 [1]

Answer:

Operating core is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means of improving their operating efficiency

Explanation:

  • At the bottom of the organization is the operating core.
  • These are the people that do the basic work of producing the products or delivering the services.
  • In the simplest organizations, the operators are largely self-sufficient, coordinating through mutual adjustment.
  • In those organizations, there is almost nothing but operating core.
8 0
4 years ago
Describe three ways to protect the computer and all peripheral devices from damage
omeli [17]

Here are three ways:

Cleaning: as applied to most things in our lives, cleaning also applies to protecting peripheral devices. To ensure the smooth running of such devices one needs to clean the dust and dirt from these devices once in a while. Make sure you disconnect the device before you eject it from the system.<span>

Follow instructions: Most devices come with a safety guide and instructions manual, always use the recommended settings for the smooth running of your system. These recommendations usually come from the manufacturer and are reliable.

<span>Surge suppressor/protector: One of the major issues faced by the users is faults caused by power surges. One needs to make sure to use a Surge Suppressor/Protector connected with the system to make sure it will not damaged with power fluctuations. </span></span>

3 0
4 years ago
Other questions:
  • Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amoun
    7·1 answer
  • In today's society, unethical actions are: A) Easier than ever to get away with, because the general public and insurers are les
    13·2 answers
  • Which of the following refers to the data analysis software and interactive software that allow managers to conduct analyses and
    6·1 answer
  • An ARP broadcast is sent to the special MAC address _______.
    9·1 answer
  • Which three factors should be discussed before planning and building a project?
    15·1 answer
  • A___ is a placeholder where you can enter text to manipulate and give new graphical effects.​
    13·1 answer
  • Lesson 12: while loops with the farmer. Number 9.
    10·2 answers
  • 4. In a relational database, entities are defined by
    6·1 answer
  • The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
    10·1 answer
  • An outpatient provides the following id: barbara jones, birth date 8/15/63. should a specimen be collected for this lab order?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!