1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
10

Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di

scuss two tools for consideration as use for reconnaissance in cyberattacks. Name the tools and explain how they could be used to analyze network security risks, threats, and gaps.
Computers and Technology
1 answer:
steposvetlana [31]3 years ago
5 0

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

You might be interested in
Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
ELEN [110]
DVD ahh Ipswich bios
7 0
2 years ago
Describe comm<br>unication cycle​
Vadim26 [7]

Answer:

The communication cycle is a mechanism in which one person sends a message and it moves via a resistance chain.It basically involves the conveying and receiving of messages between two individuals or entities in an easy-to-understand format. This simple back and forth example where the sender and receiver reciprocate roles represents the communication cycle.

4 0
2 years ago
Read 2 more answers
While the Internet is used to share many useful services and information, there are growing concerns about the way that the Inte
natulia [17]

Answer:

A true!

Explanation:

3 0
2 years ago
Tom and his brother caught 100 finish on a weeklong fishing trip. The total way of the fish was 235 pounds. What is the weight o
valina [46]

This is math but here is the answer. All you have to to to find this problem is divide 235 by 100 which is 2.35. The total weight of one fish is 2.35 pounds.

5 0
3 years ago
Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point
Umnica [9.8K]

Answer:

Data: Data are raw facts and figures that are collected together for analysis. In other words, Simple no processing is data.

Information: Information is the facts provided about something. In simple terms, processed data is information.

Knowledge: Knowledge is the processed facts that are understand for a conclusion.

1. An item's UPC number - data

Explanation: An item number is data because simple no processing is required.

2. Change back to customer - information

Explanation: Data about a customer is information.

3. General changes to demand in different seasons - knowledge

Explanation: Requires data (time and quantity purchased) to be processed/aggregated into information. The information is understood to provide a pattern of demad changes due to seasons.

4. Cost each - data

Explanation: Cost each is data because simple no processing is required.

5. Quantity purchased - data

Explanation: Cost each is data because simple no processing is required.

6. Non-taxable total - information

Explanation: -- requires that data (prices, amounts and whether the item is taxable) to be processed (price * amount for items that are non-taxable).

7. Extended cost [quantity times cost each] - information

Explanation: Extended cost requires processing two pieces of data quantity and cost

8. Amount tendered - data

Explanation: Amount tendered is data because simple no processing is required.

9. Sales of an item for the last week - information

Explanation: Sales of an item for the last week requires aggregating sales for a specific time frame together

10. Upcoming holidays and customer's special needs - knowledge

Explanation: Upcoming holidays and customer's special needs requires holiday data (dates) to be combined with information gathered about customer to understand customer's special needs

11. How paid [cash, charge card, debit card] - data

Explanation: Cost each is data because simple no processing is required.

12. Shopper loyalty card number - data

Explanation: Cost each is data because simple no processing is required.

13. Taxable total - information

Explanation: Taxable total requires that data (prices, amounts and whether the item is taxable) to be processed (price * amount for items that are taxable).

Explanation:

6 0
2 years ago
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • Which ones are right
    15·1 answer
  • In 1-2 paragraphs discuss the three main purposes of design and provide examples for each. Also explain how a design might serve
    15·1 answer
  • Write a short java method that takes an integer n and returns the sum of all the odd positive integers less than or equal to n.
    5·1 answer
  • Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause
    5·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • (a) Write a program which calculates and displays the obtained marks, percentage in six subjects and assigns grades based on per
    6·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!