1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
8

Which nmap switch is used to detect target OS and services? a -S b -p c -F d -A

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

You might be interested in
Strong linkages to customers and suppliers decrease switching costs. true or false
Ratling [72]

Answer:

False

They increase switching costs .

7 0
1 year ago
You want high availability for DHCP services, a primary server to handle most DHCP requests, and a secondary server to respond t
babymother [125]

Answer:

The blocking system.

Explanation:

In order to avoid servers to replicate with each other, I should configure the blocking system of the first DHCP.

For example, if the first DHCP fails to respond, the second will get in place, however, I have to configure the first system that immediately that the second DHCP starts working, the first blocks its information and use.

By this way, there won´t be any duplicated actions or reponses.

5 0
3 years ago
According to the 2014 Pew Research Center analysis of U.S. census data, 84% of U.S. households own a(n) __________.
olga_2 [115]
Computer. :) 73% have a computer with a broadband connection to the internet, if you need that info too. 
4 0
3 years ago
Read 2 more answers
Assign True to the variable has_dups if the string s1 has any duplicate character (that is if any character appears more than on
podryga [215]

Answer:

#include <iostream>

using namespace std;

int main()

{

   string s;

   cin>>s;    //reading string

   int i,j;

   bool has_dups=false;

   int n= s.length();

   for(i=0;i<n;i++)  //to check for duplicate characters

   {

       for(j=0;j<n;j++)

       {

           if(j!=i && s[i]==s[j])  //to check if it is matched with itself

           {

               has_dups=true;  //if true no need to check others

               break;

           }

       }

   }

   cout<<has_dups;

   return 0;

}

OUTPUT :

California

1

Explanation:

Above program finds if a character repeat itself in the string entered by user.

4 0
3 years ago
Please post detailed answers to the following questions. Please use complete sentences.
Aloiza [94]

Please post detailed answers to the following questions. Please use complete sentences t two artists from the following list: Phil Borges,Lee Jeffries.

<h3>What are photography opportunities?</h3>

The taking of constant or nevertheless snap shots furnished a brand new medium with which to seize reality, and modified the manner humans in general, and artists in particular, noticed the arena and created new inventive opportunities. Learning from the technological know-how of photography, artists evolved a selection of the latest portrayal techniques.

Photography modified our imaginative and prescient of the arena with the aid of using presenting greater get entry to to greater snap shots drawn from greater locations and instances withinside the global than ever before. Photography enabled snap shots to be copied and mass-distributed. The media-sphere became burgeoning.

Read more about the internet :

brainly.com/question/2780939

#SPJ1

4 0
2 years ago
Other questions:
  • Okay so, not really a question but whatever it’s been bothering me.
    9·2 answers
  • Briefly explain five measures you have undertaken to protect your confidential
    12·1 answer
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • Type the correct answer in each box. Spell all words correctly.
    14·2 answers
  • Match each code snippet to its appropriate markup language name
    12·1 answer
  • Define the term hardwar<br><br>​
    9·2 answers
  • Sam’s password is known to be formed of 3 decimal digits (0-9) in a given order. Karren and Larry are attempting to determine Sa
    9·2 answers
  • Which engineer may design a GPS for a vehicle?
    15·1 answer
  • Java question
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!