1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
8

Which nmap switch is used to detect target OS and services? a -S b -p c -F d -A

Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

You might be interested in
Four differences between general and special purpose conputer in points.......
cupoosta [38]

Explanation:

hope this helps to uhh...

4 0
3 years ago
Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certa
Leona [35]

Answer:4. Authorization memo

Explanation: Authorization memo is a document that gives a go ahead to perform certain activities on the network, gives you the opportunity to work on the network on behalf of the CIO, although you are as well reminded that you are only doing this on behalf of someone, therefore advised to take precautions. Authorization memo is a reminder formal document that gives you access to do something on behalf of your CIO.

4 0
3 years ago
The way a particular application views the data from the database that the application uses is a.
masha68 [24]

The way a particular application views the data from the database that the application uses is a sub-schema.

<h3>What is Database?</h3>

A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.

The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.

Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.

To learn more about Database, refer to the link:

brainly.com/question/26096799

#SPJ4

4 0
2 years ago
Using the find and replace tool would be most appropriate when
mafiozo [28]

A. Changing the company name when the same letter is sent to different companies

The find and replace tool is meant to help replace all instances of a certain piece of text with a different piece of text.

For example, if a letter was sent to Company A, the find and replace tool could change every time the letter says “Company A” and make it say “Company B” instead so the same letter could be sent to Company B.

3 0
4 years ago
Read 2 more answers
A technician is building a workstation that is to be used as an HTPC and will sit next to the audio receiver. Which of the follo
loris [4]

Answer:

B, Mini-ITX

Explanation:

According to my research on information technology and it's hardware, I can say that based on the information provided within the question the technician is most likely to use a Mini-ITX case. This is because an HTPC is a A Home Theater PC which does not need all the hardware that a regular PC needs, just the minimum specs, and these devices are usually hidden away in a drawer or behind the TV. Therefore he needs the smallest PC case which is a Mini-ITX.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
Other questions:
  • Jason is creating a webpage on the basic parts of a camera. He has to use a mix of both images and content for the web page to h
    11·1 answer
  • "You have an interface on a router with the IP address of 192.168.192.10/29. Including the router interface, how many hosts can
    14·1 answer
  • Write a program in C++ to implement bubblesort using the swap function ?
    11·1 answer
  • Differences between mechanical and optical mouse <br>Plz help me
    6·1 answer
  • Which of the following is NOT a valid name for a function?
    5·1 answer
  • Construct a class that will model a quadratic expression (ax^2 + bx + c). In addition to a constructor creating a quadratic expr
    13·1 answer
  • What usually happens during the investigation &amp; analysis stage of the Systems Life Cycle
    15·1 answer
  • Your personal opinion about what a "successful" console in the future will need to include to sell well. How have the changes in
    12·1 answer
  • What is the result of the following code?<br><br> x=7//2+10%2**4<br><br> print(x)
    15·1 answer
  • What is output by the following line of code?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!