1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
10

Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di

scuss two tools for consideration as use for reconnaissance in cyberattacks. Name the tools and explain how they could be used to analyze network security risks, threats, and gaps.
Computers and Technology
1 answer:
steposvetlana [31]3 years ago
5 0

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

You might be interested in
Mike is reading about machine-dependent programming languages. Which languages are machine-dependent programming languages?
Scilla [17]

Answer:

Assembly Language

Explanation:

Machine dependent is a language that only runs on specific machines. The early languages were machine-dependent while the advanced languages are machine-independent.

In the early languages, the main machine dependent language was machine language. Later on, Assembly language was introduced. Assembly language was also machine-dependent as it only runs on specific kinds of PCs.

8 0
3 years ago
Design an if-then statement ( or a flowchart with a single alternative decision structure that assigns 20 to the variable y and
xz_007 [3.2K]

Answer:

The conditional statement and its flowchart can be defined as follows:

Explanation:

Conditional statement:

if x>100 Then //defining if that check x value greater than 100

y=20//holding value in the y variable

z=40//holding value in z variable

End if

5 0
3 years ago
What is an avenue in a Karel world?
Andrews [41]

Answer:

Karel's World  contains horizontal streets (running east-west) and vertical avenues (running north-south). can contain interior wall sections that are positioned between adjacent street corners and prevent Karel from moving directly between these street corners.

3 0
2 years ago
Read 2 more answers
WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
Andrews [41]

Answer:

python is probably the best is you are a begginer

java and C++ are good too

6 0
2 years ago
When you use the bufferedreader class, you must import the ____ package into your program?
BigorU [14]
When you use the bufferedreader class, you must import the java.io package into your program.  It is<span> an API that comes with </span>Java<span> which is aimed at reading and writing data (input and output). ... For instance, read data from a file and write to a file or write a response back over the network. The </span>Java IO<span> API is located in the </span>Java IO<span> package ( </span>java.io<span> ).</span>
5 0
3 years ago
Other questions:
  • When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
    7·1 answer
  • To find a webpage, the user of a search engine would simply enter a word or phrase in the resource's text box. what is the term
    11·1 answer
  • When you access the programs and documents on a computer by what way of icons is said to be employing
    6·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    12·2 answers
  • Select the correct answer.
    5·2 answers
  • Write an algorithm for finding the perimeter of a rectangle
    6·1 answer
  • Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
    15·1 answer
  • Which tab on the Ribbon contains the command to print a publication?
    10·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!