1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
N76 [4]
3 years ago
11

A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for futur

e access and decide to open a telnet server on the exploited host. Three steps are required. What is the proper sequence of commands to successfully create this backdoor?
Computers and Technology
1 answer:
Katen [24]3 years ago
5 0

Answer:

The following Commands are:

  • First, sc config TlntSvr start=auto ;
  • Second, net start TlntSvr ;
  • Third, netsh firewall add portopening TCP 23 "Telnet"

Explanation:

Telnet is the protocol which allows user to connect with the remote computers (called as hosts) over the TCP/IP(Transmission Control Protocol/Internet Protocol) networks (such as an internet). Using the telnet clients' software on the user's computer, they can make the connections to the telnet server.

You might be interested in
Write an application named [LastName]_MultiplicationTable and create a method that prompts the user for an integer value, for ex
WITCHER [35]

Answer:

I did this in C# & Java

Explanation:

C#:

       public static void Main(string[] args)

       {

           int input = Convert.ToInt32(Console.ReadLine());

           Multiply(input);

       }

       public static int Multiply(int input)

       {

           int ans = 0;

           for(int i =1; i<=10; i++)

           {

               ans = i*input;

               Console.WriteLine(i + "*" + input + "=" + ans);

           }

           return ans;

       }

Java:

   public static void main(String[] args)

   {

       Scanner myObj = new Scanner(System.in);  

       int input = Integer.parseInt(myObj.nextLine());

       Multiply(input);

   }

   public static int Multiply(int input)

   {

       int ans = 0;

       for(int i =1; i<=10; i++)

           {

               ans = i*input;

               System.out.println(i + "*" + input + "=" + ans);

           }

       return ans;

   }

7 0
3 years ago
In which of the following situations is it probably better to use a fixed-size array over another more flexible option, like Arr
ddd [48]
D) a situation where you don’t know....
7 0
3 years ago
You are most likely to use<br> images for photos or digital paintings.
Lubov Fominskaja [6]

Answer: Digital Paintings

7 0
3 years ago
Dr. Watson has been kidnaped! Sherlock Holmes was contacted by the kidnapper for ransom. Moments later he received a message fro
adelina 88 [10]

Answer:

please mark me brainlist

Explanation:

This algorithm works for n number of strings in python3

Input:

83217

8213897

683147

Output:

837

from itertools import product

import pdb

import numpy as np

def neigh(index):

N = len(index)

for ri in product((0, -1), repeat=N):

if not all(i == 0 for i in ri):

yield tuple(i + i_rel for i, i_rel in zip(index, ri))

def longestCommonSubSequenceOfN(sqs):

numberOfSequences = len(sqs); # to know number of sequences

lengths = np.array([len(sequence) for sequence in sqs]); # to know length of each sequences placed in # array

incrLengths = lengths + 1; # here we are taking no .of sequences +1

lengths = tuple(lengths); # making lengths into tuple to make it mutable

inverseDistances = np.zeros(incrLengths);

ranges = [tuple(range(1, length+1)) for length in lengths[::-1]]; # finding ranges from 1 to each lengths

for tupleIndex in product(*ranges):

tupleIndex = tupleIndex[::-1];

neighborIndexes = list(neigh(tupleIndex)); # finding neighbours for each tupled index value and # store them in list

operationsWithMisMatch = np.array([]); # creating array which are miss matched

 

for neighborIndex in neighborIndexes:

operationsWithMisMatch = np.append(operationsWithMisMatch, inverseDistances[neighborIndex]);

#appending newly created array with operations miss match and inverseDistances

operationsWithMatch = np.copy(operationsWithMisMatch);

# copying newly generated missmatch indexs

operationsWithMatch[-1] = operationsWithMatch[-1] + 1;

# incrementing last indexed value

chars = [sqs[i][neighborIndexes[-1][i]] for i in range(numberOfSequences)];

# finding a string(chars) with neighbour indexes and checking with other sequences

if(all(elem == chars[0] for elem in chars)):

inverseDistances[tupleIndex] = max(operationsWithMatch);

else:

inverseDistances[tupleIndex] = max(operationsWithMisMatch);

 

subString = ""; # resulted string

mainTupleIndex = lengths; # copying lengths list to mainTupleIndex

while(all(ind > 0 for ind in mainTupleIndex)):

neighborsIndexes = list(neigh(mainTupleIndex));

#generating neighbour indexes with main tuple index in form of list

anyOperation = False;

for tupleIndex in neighborsIndexes:

current = inverseDistances[mainTupleIndex];

if(current == inverseDistances[tupleIndex]): # comparing indexes in main tuple index and inverse #distance tuple index

mainTupleIndex = tupleIndex;

anyOperation = True;

break;

if(not anyOperation): # if anyoperation is False then we are generating sunString

subString += str(sqs[0][mainTupleIndex[0] - 1]);

mainTupleIndex = neighborsIndexes[-1];

return subString[::-1]; # reversing resulted string

sequences = ["83217", "8213897", "683147"]

print(longestCommonSubSequenceOfN(sequences)); #837

8 0
3 years ago
Algorithms may be inefficient when used by a human brain.Answers:a. Algorithms can take in a relatively small amount of informat
Flauer [41]

Answer:

The correct answer is d. Algorithms may be inefficient when used by a human brain.

Explanation:

This is a situation typical of algorithms, since in order for them to work perfectly, the participation of people who carry out the necessary tests is required for the new creation to be useful in a specific field. Algorithms are logical operations determined according to a pattern, but the functioning of the human brain is in many cases different from a simple algorithm, since it associates situations and, depending on their complexity, also solves them.

3 0
3 years ago
Read 2 more answers
Other questions:
  • 5. How do vector graphics used with CRT technology work? List at least one of vector graphics’ advantages over raster graphics,
    9·1 answer
  • Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c
    8·1 answer
  • The calcCircleCircumf() method invoked within in the CircleStatsTester class is overloaded. Write the overloaded methods in the
    8·1 answer
  • Can someone please help me on these short short questions marking Brainly computer modeling people please help
    14·1 answer
  • A spreadsheet has some values entered: Cell A1 contains 10, cell A2 contains 14, cell A3 contains 7. You enter in cell A4 the fo
    7·2 answers
  • Write 5 things that can be done to avoid computer vision syndrome
    8·2 answers
  • Which of the following is needed to connect to the Internet? HELP ASAP
    9·1 answer
  • A Development team begins work on a new software application and decides to involve the client’s IT experts to ensure that secur
    12·1 answer
  • Which company introduce the first Minicomputer in 1960.​
    8·2 answers
  • Microsoft® Publisher does which of the following?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!