1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
8

Which nmap switch is used to detect target OS and services? a -S b -p c -F d -A

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

You might be interested in
true or false: for most queries, the user location changes our understanding of the query and user intent.
Kipish [7]
The answer is true because I don't know
4 0
4 years ago
```{r}
Stells [14]
Know what your trying to say her input pound 45-94
4 0
3 years ago
How to add more then one picture on a brainy question really need this
Shalnov [3]

Just go on the upload thing and upload two pictures

Works for me anyway

3 0
3 years ago
Which of these printers would be the most suitable for printing a large number of high quality black and white printouts?
Alex777 [14]

Answer:

A laser pointer

Explanation:

A laser printer would be the most suitable printer for printing a large number of high quality black and white printouts

8 0
3 years ago
Why should you limit what information is in your digital footprint?
oee [108]

Answer:

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

Explanation:

3 0
4 years ago
Other questions:
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • Which of the following scenarios can best be addressed by operations management?
    11·1 answer
  • Once you resize a photograph, it cannot be returned to its original size. TRUE or FALSE
    8·1 answer
  • Assuming there are 100 million households in the US, and that each household has two HDTVs, and that each TV is used to watch 4
    15·1 answer
  • Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single i
    15·1 answer
  • The bubble sort algorithm sorts using what technique?
    14·1 answer
  • What are your thoughts on copyright?<br><br> (Write 2 or more sentences)
    9·2 answers
  • The reason why our computers can get faster without getting bigger is because of...
    14·1 answer
  • ________(fill in the blank)in online education is intrinsically related to equity.
    13·1 answer
  • Scenario: The deputy incident commander will be replacing the current incident commander, who needs to attend to a family emerge
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!