1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
4 years ago
10

Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di

scuss two tools for consideration as use for reconnaissance in cyberattacks. Name the tools and explain how they could be used to analyze network security risks, threats, and gaps.
Computers and Technology
1 answer:
steposvetlana [31]4 years ago
5 0

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

You might be interested in
Discuss advantages and disadvantages of operating system
Serjik [45]

Answer and Explanation:

Advantages-

  1. Computing source- Through the operating system, users can communicate with computers to perform various functions such as arithmetic calculations and other significant tasks.
  2. Safeguard Of Data- There’s a lot of user data stored on the computer. Windows Defender in Microsoft Windows detects malicious and harmful files and removes them. Also, it secures your data by storing them with a bit to bit encryption.
  3. Resource Sharing- Operating systems allow the sharing of data and useful information with other users via Printers, Modems, Players, and Fax Machines. Besides, a single user can share the same data with multiple users at the corresponding time via mails. Also, various apps, images, and media files can be transferred from PC to other devices with the help of an operating system.

Disadvantages-

  1. Expensive- It is costly.
  2. System Failure- System failures may occur. If the central operating system fails, it will affect the whole system, and the computer will not work. If the central system crashes, the whole communication will be halted, and there will be no further processing of data.
  3. Virus Threats- Threats to the operating systems are higher as they are open to such virus attacks. Many users download malicious software packages on their system which halts the functioning of OS and slow it down.

4 0
3 years ago
Read 2 more answers
Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
Paladinen [302]

Answer:

There is only one modification in the above loop i.e. while loop should be like this--

while (i != n)

     {

         sum+=arr[i];   // Line 1, In question segment it is line 2.

          i++;                // Line 2,  In question segment it is line 1.

     }

Output:

Now if the array input is 1,2,3,4,5 then the output is 15.

Explanation:

In the above question, all the line of the segment is right except the body of the loop because--

  • The First line of the loop is increment statement which increments the value of "i" variable from 1 and the value of "i" variable will be 1 in the first iteration of the loop
  • The second line starts to add the value from 1'st index position of the array. Hence the segment gives the wrong answer. It adds the arr[1] to arr[n-1].
  • So I interchanged both lines of the while loop as shown in the answer part. I make the line 1 (In question segment) as line 2(In answer part) and line 2 (In question segment) as line 1 (In answer part).

Now It gives the correct output because it can add arr[0] to arr[n-1].

7 0
4 years ago
True or False: You should only use your mirrors to see behind you when parallel parking.
mafiozo [28]
False. You should always look /check ou tall mirrors periodicly
8 0
3 years ago
Read 2 more answers
What two statements about IPv6 addresses are true? This task contains the radio buttons and checkboxes for options. The shortcut
Oliga [24]

Answer:

A and C

Explanation:

Option A:

In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”  

Here is an example

How to reduce the following IPv6 address?

ff02:0000:0000:0000:0000:0000:0000:d500

Ans: ff02::d500

Example 2:

2001:ed02:0000:0000:cf14:0000:0000:de95

Incorrect Answer -> 2001:ed02::cf14::de95  

Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:

Correct Answer -> 2001:ed02::cf14:0:0:de95

Or

2001:ed02:0:0:cf14::de95

Option C:

Since in IPv6 there are 2^{128} available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.

4 0
4 years ago
TensorFlow and PyTorch are examples of which type of Machine Learning (ML)<br> platform?
Kisachek [45]

Answer:

DEEP LEARNING

Before looking into the code, some things that are good to know: Both TensorFlow and PyTorch are machine learning frameworks specifically designed for developing deep learning algorithms with access to the computational power needed to process lots of data (e.g. parallel computing, training on GPUs, etc).

Explanation:

PLZ MARK AS THE BRAINLIEST

HAVE A GOOD DAY

: )

3 0
3 years ago
Other questions:
  • Select the correct answer.
    8·1 answer
  • Free points! your welcome
    9·2 answers
  • Ano kaya ang nararamdaman mo at mangyari sayo kung tatlong araw ka nang hindi kumakain​
    6·1 answer
  • Time complexity: Be sure to show your work. Suppose that a particular algorithm has time complexity T (n) = 10 ∗ 2n, and that ex
    7·1 answer
  • Which quality allows programmers to modify a program as and when required
    11·2 answers
  • True or False:<br><br> You can convert your PowerPoint presentation in web pages.
    8·2 answers
  • Aside from human user types, there are nonhuman user groups. Known as account types, __________ are implemented by the system to
    10·1 answer
  • Select the correct text in the passage.
    12·1 answer
  • Using only AND, OR and inverter gates to implement the above Boolean equation, how many gates are needed
    8·1 answer
  • What is word processing program,Give 3 types of word processing program​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!