1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
professor190 [17]
3 years ago
14

hackers can use as part of a reconnaissance process to learn about active network addresses and active processes?

Computers and Technology
1 answer:
aalyn [17]3 years ago
3 0

Answer:

ICMP.

Explanation:

Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.

ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.

You might be interested in
Data in the form of digits is called
Flauer [41]
Numeric data because it consist of numbers
5 0
2 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Using reliable internet sources, identify three ways we use analog and digital signals in our everyday lives.
Montano1993 [528]
Clocks maybe is the answer. I really don’t know
7 0
3 years ago
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program call
Elis [28]

Answer:

Trojan horse

Explanation:

Trojan, also known as Trojan horse is a type of malware that ensures that its users are misled of its true purpose. They are a common type of virus and are very dangerous in such a way that they can even hide within other programs that are harmless. Once installed, Trojan will infect every file on your computer and can even steal information or totally infiltrate your system.

8 0
3 years ago
Describe the psychological aspects of driving<br> describe the physiological aspects of driving
PIT_PIT [208]
<span>Driving Psychology is now in the beginning stages and is still evolving in content and method, in response to the new need for managing driving behavior in an industrialized society. The goal of Driving Psychology is to reverse the natural trend of escalating accidents that occur with a sharp increase in the number of drivers and miles driven. </span>
5 0
3 years ago
Other questions:
  • true or false: the larger your sample size for a survey, the more likely it is that you will draw false conclusions from your in
    13·1 answer
  • Two files named numbers1.txt and numbers2.txt both have an unknown number of lines, each line consisting of a single positive in
    11·1 answer
  • 2. Fabulously Fit offers memberships for
    9·1 answer
  • The issue with discovering a perfect solution to a problem is that ________.
    10·2 answers
  • The part of the computer that contains the brain, or central processing unit, is also known as the
    15·1 answer
  • Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide
    8·1 answer
  • what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found
    6·1 answer
  • What is wrong with this code and correct it.
    12·1 answer
  • A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
    9·1 answer
  • If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!