1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
15

Which network protocol is used to route IP addresses?A. TCPB. UDPC. IPD. ICMP

Computers and Technology
1 answer:
ladessa [460]3 years ago
8 0

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

You might be interested in
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
Hymter. Wants to workin The Energy career field with electrical energy
m_a_m_a [10]

Answer: what is the question

Explanation:

3 0
3 years ago
Which unique address is a 128-bit address written in hexadecimal?
pentagon [3]
Every hexadecimal digit represents 4 bits, so the address has 128/4 = 32 digits.

A GUID (Globally Unique IDentifier) has 128 bits. They are usually written like this:

{38a52be4-9352-4<span>53e-af97-5c3b448652f0}.</span>

There are different types of guids, depending on how they are generated. The first digit of the third group reveals the type. In the example above it is 4. A type 4 guid is fully random (except of course for the 4).

3 0
3 years ago
7. Glaciers have two types of deposition. Define them below:
Zielflug [23.3K]
<span>The Glacial deposition is the settling of sediments left behind by a moving glacier. As glaciers move over the land, they pick up sediments and rocks. The mixture of unsorted sediment deposits carried by the glacier is called glacial till. Piles of till deposited along the edges of past glaciers are called moraines.</span>
5 0
3 years ago
Tax that you pay when making a profit from selling a house is an example of:
spayn [35]
B lol its the only one that makes since all though im not sure if im exactly right 
4 0
2 years ago
Other questions:
  • To create an individual version of a slide, you would click
    9·1 answer
  • What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
    12·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    12·1 answer
  • What do we call a subset of new media in which groups and their fans can interact directly?
    14·1 answer
  • The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
    8·1 answer
  • The countryside presents
    11·1 answer
  • Describe the importance of human interaction in a computing system.
    14·2 answers
  • 2.13 LAB: Branches: Leap Year
    11·1 answer
  • The BaseballPlayer class stores the number of hits and the number of at-bats a player has. You will complete this class by writi
    13·1 answer
  • After reading his e-mail messages, Orlando became very frustrated. Many of the messages he received did not conform to netiquett
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!