1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
8

Which nmap switch is used to detect target OS and services? a -S b -p c -F d -A

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

You might be interested in
The person responsible for setting goals and schedules, monitoring work, motivating the team, and reporting progress to managers
Naily [24]

Answer:

D. Project Manager

Explanation:

4 0
3 years ago
A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
blagie [28]

Answer:

C. Symptoms of malware mutation

Explanation:

They are signs that could indicate that ones system is infected by virus.

Such signs includes:

1.Slow booting or startup.

2.Low space storage.

3.Blue screen of death.

4.Slow Internet performance.

5.Sending of spam messages.

6.Disabled security.

7.Browsing error.

8.Pop-up messages.

9.Renaming of files.

10.Loss of certain files, music, messages, etc.

3 0
3 years ago
Read 2 more answers
Which type of shape allows you to add text that can be moved around.
Kipish [7]

Answer:

Move a text box, WordArt, or shape forward or backward in a stack. Click the WordArt, shape, or text box that you want to move up or down in the stack. On the Drawing Tools Format tab, click either Bring Forward or Send Backward.

3 0
2 years ago
In a complex system, many subsystems interact with one another. How do these systems interact in terms of inputs and outputs?
Artemon [7]

Answer:

I think in there transmission you know inputs into ports like for their own

Explanation:

likeslike Spanish and is obviously inputs and outputs their portsinto the portsdifferent ports you know

4 0
3 years ago
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
saveliy_v [14]

Answer:

System software.

Explanation:

System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.

An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

4 0
3 years ago
Other questions:
  • The control programs managing computer hardware and software perform the _________ function to control and prioritize tasks perf
    8·1 answer
  • The FaceSnap app has permission to use many devices on your smartphone, including the camera. A data privacy concern that arises
    6·1 answer
  • What is the quickest way to change the format of a table?
    8·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • How to solve a program that accepts a number as input and prints just the decimal portion
    15·2 answers
  • Debug the following program.
    5·1 answer
  • State two function of protein in the body
    8·1 answer
  • For each obstacle, select the best solution. failing to find other members for a club: failing a class: failing to get the credi
    9·2 answers
  • How would you describe<br> "analogous color harmony" to a six year old?
    13·1 answer
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!