1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
6

How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability

assessment scanning tools?
Computers and Technology
1 answer:
Tresset [83]3 years ago
7 0
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
You might be interested in
A programmer is responsible for solving a problem and making a presentation that includes his solution. He does not have much ro
sashaice [31]

Probably 2 but that's just a guess.


5 0
3 years ago
Read 2 more answers
Two people can verify they are communicating with each other by using a ____________, which verifies each party's identity by be
photoshop1234 [79]

Answer:

b. Certificate Authority

Explanation:

Based on the information provided within the question it can be said that they are communicating with each other by using a certificate authority. This term refers to a company or organization that provides security verification by issuing both parties cryptographic keys which are specifically verified by the company in order to allow both parties to know exactly who they are communicating with.

5 0
3 years ago
A variable like user_num can store a value like an integer. Extend the given program as indicated. Output the user's input. (2 p
lapo4ka [179]

Answer:

The answer to this question is given below in the explanation section. It is noted that this program is written in C++ using online C++ compiler.

Explanation:

#include <iostream>

using namespace std;

int squared(int num)// this is the function to compute square

   {

       return num*num;

   }

int cube(int num)// this is the function to compute cube

   {

       return num*num*num;

   }

int main()

{

   int user_num, user_num2; // variable declaration

   

       cout<<"Enter the first number: ";//prompt user to enter the number

       cin>>user_num;//store the user entered number into variable

       cout<<"\nEnter the second number: ";//prompt the user to enter the second number

       cin>>user_num2;//store the user entered number into variable

   

   

   cout<<"\nSquared of first number is: "<<squared(user_num);//compute square of user_num and display

   cout<<"\nCube of first number is: "<<cube(user_num);//compute the cube of the user_num and display

   cout<<"\nSquare of second number is: "<<squared(user_num2);//compute the square of user_num2 and display

   cout<<"\nCube of second number is: "<<cube(user_num2);//compute the cube of user_num2 and display

   

   cout<<"\nSum of number 1 and number 2 is: "<<user_num2 + user_num2;//display the sum of user_num2 and user_num

   cout<<"\nProduct of number 1 and number 2 is: "<<user_num2 * user_num;//display the product of user_num and user_num2

   

   

   return 0;//terminate the program

}

                               

7 0
4 years ago
Assume your organization has 200 computers. You could configure a tool to run every Saturday night. It would query each of the s
lukranit [14]

The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

<h3>What are compliance tools?</h3>

The Security Compliance Manager is known to be a form of downloadable tool that one can use as it helps a person to plan, ascribe, operate, and manage a person's security baselines for Windows client and other forms of server operating systems.

Note that in the case above, The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

Learn more about Security Compliance Manager from

brainly.com/question/24338783

#SPJ1

4 0
2 years ago
What domain name would you be likely to find in the url of a large environmental group?
horrorfan [7]
The domain name you are likely will find in a url of  a large environmental group is .org.
The domain name .org is a generic top-level domain name system(DNS) used in the internet.The name is truncated from organization.
5 0
3 years ago
Other questions:
  • A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
    8·1 answer
  • Crashing almost always accelerates the schedule while increasing project risk, whereas fast tracking almost always accelerates t
    10·1 answer
  • A computer has the following parameters Operation Frequency Cycles Arithmetic/Logical instructions 65% 1 Register load operation
    11·1 answer
  • Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
    15·1 answer
  • IMPORTANT!!<br><br> How can you get real answer keys for edmentum (plato) courses as a student?
    11·1 answer
  • Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
    5·1 answer
  • You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use?A. 255.25
    12·1 answer
  • Write a Python program which asks a user for a word and performs letters manipulation. If the word is empty, the program should
    6·1 answer
  • What is modern? explain​
    11·1 answer
  • Snippet 1: check_file_permissions.c #include
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!