1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
4 years ago
6

How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability

assessment scanning tools?
Computers and Technology
1 answer:
Tresset [83]4 years ago
7 0
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
You might be interested in
Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. What will he use?
Goryan [66]

Answer:

A) fuzzer

Explanation:

From the question, we are informed that Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. In this case,he will use a fuzzer. A fuzzer can be regarded as a program that gives in a semi-random data to a program/stack, and it will detect bug. fuzzing testing can be regarded as

software testing process which discover bugs in the software, this is done automatically by giving in input of randomized data to the computer program. Generation of data is done by a generator, while vulnerability identification depends on the tools use in the debugging process.

8 0
3 years ago
Which teamwork characteristic motivates your team members to perform better?
scoundrel [369]
Maybe Encouragement? I don't know, are there any choices to choose from?
4 0
3 years ago
Read 2 more answers
Name the three basic storage device of a computer​
grigory [225]
Hard disk Drive, random access memory, USB flash memory
7 0
4 years ago
Read 2 more answers
Which type of animation is best for developing characters that would showcase depth and realism?
Roman55 [17]
3D animation is best for developing characters and would showcase depth and realism.

Conversely, one would use 2D animation to create a flat appearance.
8 0
3 years ago
John wants to draw a letter L. The turtle is pointing towards the top of the screen. Which series of commands will draw the shap
ArbitrLikvidat [17]

Explanation:

BACK 100 RIGHT 90 FORWARD 50

6 0
2 years ago
Other questions:
  • What movie won best picture oscar for 1990
    14·2 answers
  • Riley is using access to collect data for a science project. he is creating a report and wants to apply predefined color and fon
    6·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • What is the term for a server at the highest level of the Domain Name System (DNS)?
    15·1 answer
  • 3. Find the product of (a² +3a+5) x (a+7)​
    7·1 answer
  • EMERGENCYYYYY what does it mean when i get a security alert when i download an addon on google docs
    7·1 answer
  • If Tracy is facing right, which of the following commands can be used to turn her to face up?
    9·1 answer
  • freeeeeeeeeeeeeeeeee poiiiiiiiiiiiiiiiiiiiiiiiiiinnnnnnnnnnnnnnnnnnnnnnttttttttttttttttttttttttsssssssssssssssssss
    14·2 answers
  • Find the errors<br><br> Look to the following code and fix the errors
    9·1 answer
  • If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped co
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!