1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
6

How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability

assessment scanning tools?
Computers and Technology
1 answer:
Tresset [83]3 years ago
7 0
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
You might be interested in
The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
pickupchik [31]

Answer:

CyberStalking

Explanation:

Stalking over the internet carried out . it target individuals or organisation to stalk and harass

5 0
3 years ago
Anyone got the edmentum computer programming post test answers?
Arturiano [62]

Answer:

yessir

Explanation:

7 0
3 years ago
. Why is it important to use Social Media responsibly? ANSWER NOW!!!
Alenkinab [10]

Answer:

Why is social media important? Social media is important because it allows you to reach, nurture, and engage with your target audience — no matter their location. When a business can use social media to connect with its audience, it can use social media to generate brand awareness, leads, sales, and revenue.

5 0
2 years ago
Read 2 more answers
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
2 years ago
Match the following tasks with their appropriate timing.
Oliga [24]

Answer:

3. 1. 2. daily, weekly, monthly

Explanation:

8 0
3 years ago
Other questions:
  • Which graphic design tool allows you to lay images on top of one another? A. Layers B. Selection C. Drawing D. Color
    10·2 answers
  • Florida Highway Safety and Motor Vehicles reported blank of traffic fatalities were alcohol-related in Florida in 2009.​
    8·1 answer
  • According to the "multiple-selves" theory, of an online DVD rental service could offer same-day deliveries, so that people who o
    9·1 answer
  • Which result is most likely if a network packet has no header?
    9·2 answers
  • ________________, _______________ and ___________ are what you see when you open Excel
    15·1 answer
  • Drag the right word to it’s definition
    13·1 answer
  • Do you remember your first 3D movie experience? What was the movie, what was the experience like, and why was it memorable? (If
    7·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    13·1 answer
  • What is data science?​
    15·1 answer
  • state an application that would be better to write c++ than java and give a rationale for your answer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!