1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
10

Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di

scuss two tools for consideration as use for reconnaissance in cyberattacks. Name the tools and explain how they could be used to analyze network security risks, threats, and gaps.
Computers and Technology
1 answer:
steposvetlana [31]3 years ago
5 0

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

You might be interested in
8. Understanding the proper classification of a problem or fault
kati45 [8]

Answer:

a

Explanation:

because the trust need to know what was the problem in the first place

8 0
4 years ago
Raj needs to apply sorting to a current list in his Word document.
dmitriy555 [2]

Answer:

Home tab styles group

Explanation:

Edjenuity 2020

4 0
3 years ago
Read 2 more answers
Please help me with this!!
lisabon 2012 [21]

Answer:

sort(), incomes, newWord = word1 + word2 , ressource document, add()

Explanation:

3 0
3 years ago
para que sirve los siguientes sistemas operativos : a. Windows 10 b. Apple yosemite c. linux Ubuntu d. Android marshmallow e. IO
harkovskaia [24]

<span>melcocha Andoid , pero me gusta correr piruleta androide 5.0.1</span>
4 0
3 years ago
you're adding new wires in your building for some new offices. the building has a false ceiling that holds the lights and provid
AlladinOne [14]

Based on the above, the  type of cable that need to be used by you is option B) Plenum rated cable.

<h3>What is plenum rated cable mean?</h3>

Plenum rated cable is known to be a kind of a cable that tends to have a unique form of insulation that is known to have low smoke and low flame attribute.

Note that the Plenum cable is one that need to be installed in any "air handling" space and as such, Based on the above, the  type of cable that need to be used by you is option B) Plenum rated cable.

Learn more about cable from

brainly.com/question/13258934

#SPJ1

See full question below

You are adding new wires in your building for some new offices. The building has a false ceiling that holds the lights and provides an air path for heating and air conditioning. You would like to run your Ethernet cables in this area. Which type of cable must you use?

A) STP cables

B) Plenum rated cable

C) Cat 5e or Cat 6a cables

D) PVC jacketed cables

E) Fiber optic cables

6 0
1 year ago
Other questions:
  • In the u.s.all financial institutions are required to conduct business at a physical location only
    9·1 answer
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • When did the digital revolution begin
    10·1 answer
  • ​______________________ is a general security term that includes computer​ viruses, worms, and trojan horses.
    13·1 answer
  • Maeve has created the website, but she is not able to include more than one blank space at a time. Even if she hits the SPACE bu
    6·1 answer
  • On a rheostat the first terminal is connected to a
    14·1 answer
  • What was his beliefs?
    6·1 answer
  • PLTW IM Chapter 1.2-1.3 i need this please
    9·1 answer
  • Subscribe to my you tube channel to get all your questions answered
    8·1 answer
  • How to edit slides into video.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!