1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
4 years ago
6

How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability

assessment scanning tools?
Computers and Technology
1 answer:
Tresset [83]4 years ago
7 0
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
You might be interested in
Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is p
Vika [28.1K]

Answer:

Polymorphism

Explanation:

You can have a basic button class that gets inherited by other classes.

class Button {

function pushButton(){}

}

class ElevatorButton extends Button{};

class BigRedButton extends Button{};

With these new classes, they inherit from the basic button class. They can decide what happens when the method pushButton() is called.

You don't need to worry about what pushButton() actually does, you can just call it if the object is of the type "Button" and you can expect it to work.

4 0
2 years ago
Plz answer me will mark as brainliest ​
Vesnalui [34]
I’m pretty sure the answer for 1 is B.
And the answer for 2 is True.
4 0
3 years ago
2. A well designed high-volume system will minimize _________ inventory and reduce _____________for the product or service. a) w
valina [46]

Answer:

A.

Explanation:

A well designed high-volume system will minimize work-in-process (WIP) inventory and reduce lead time for the product.

Work in process (WIP) are partially finished products. WIP inventory could be minimized by designing a suitable high-volume system.

Lead time or throughput time is the time taken for a product to be manufactured or processed. A well designed high-volume system would reduce throughput time.

7 0
3 years ago
Is a device connected to a sound card in the system.
SSSSS [86.1K]

Answer:

Yes

Explanation:

A sound card (also known as an audio card) is an internal expansion card that provides input and output of audio signals to and from a computer under control of computer programs. The term sound card is also applied to external audio interfaces used for professional audio applications.

8 0
3 years ago
Producing goods only enough to meet the basic needs of the family is called
kramer

Answer:

Subsistence production

4 0
3 years ago
Other questions:
  • Which socket type is soldered to the motherboard, along with the cpu?
    6·1 answer
  • Which one of these tasks best describes the process of localization?
    12·1 answer
  • Do you like Houseparty?
    7·1 answer
  • Hundreds of a bank’s customers have called the customer service call center to complain that they are receiving text messages on
    7·1 answer
  • Which type of software is primarily used to organize a collection of information for easy access?
    15·1 answer
  • One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all t
    15·1 answer
  • Why is data processing done in computer?​
    14·1 answer
  • PLEASE HELP
    12·1 answer
  • What are some of the functions in the Consolidate dialog box? Check all that apply.
    6·1 answer
  • Input header here<br>input paragraph 1 here
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!