1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
3 years ago
11

A hacker uses a valid IP address of an internal host, and then from an external system, the hacker attempts to establish a commu

nication session with the internal host over a multitude of different ports. This is called internal code planting.
Computers and Technology
1 answer:
bulgar [2K]3 years ago
8 0

Answer:

The answer to the given question are:

False.

Explanation:

Stateful inspection is the type of firewall which is most effective against, the fragmentation, firewalking, and internal code planting.

A VPN (Virtual Private Network ) gives us online anonymity and privacy by giving private network from an internet connection which is publicly available to all. It hides the internet protocol (IP) address to keep an online use or action private.

You might be interested in
Which layer includes the physical transmission medium (cables or wireless media) that any network must use to send and receive t
Yuliya22 [10]

Answer:

The correct answer to the following question will be "Physical Layer".

Explanation:

  • The lowest layer of the OSI reference model is the physical layer. It's in charge of having to send bits from one desktop to the next.
  • This layer isn't acquainted with the interpretation of the parts and is concerned with setting up a physical wireless connection and sending and receiving signals.
  • This layer relies on aspects of the hardware, such as wires, transmitters, and network interface tokens.

Therefore, it will be the right answer.

4 0
3 years ago
The __________ is the continuity of control of evidence that makes it possible to account for all that has happened to evidence
Free_Kalibri [48]

Answer:

chain of custody

Explanation:

According to my research on the criminal investigation process, I can say that based on the information provided within the question the term being described is called the chain of custody. This is the process of documenting every person that handles a piece of evidence from the moment it was discovered to the moment that it gets presented in court.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Read 2 more answers
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Explain the operation of POS
zaharov [31]

Answer: POS stands for point of sale.

Merchants typically use a POS system to complete a sales transaction. In its most basic definition, a POS system is a combination of POS hardware and POS software to create a POS machine for processing a transaction and payment.

Explanation: Hope this helps, have a great day.

4 0
3 years ago
Procter & Gamble regularly monitors trends and information posted about their products and brands by consumers on several We
Shkiper50 [21]

Answer:

The correct answer to the following question will be "Web tracking".

Explanation:

This is indeed a business operation to keep an eye on the subscribers or visitors to the business. So what web trackers do is much more than that. They check up on your web activity.

A tracker generally seems to be a database script programmed to extract sets of data on your interests and how you are when you communicate through their database.

There are four types of Web trackers such as:

  • Embedded scripts.
  • Cookies.
  • Finger printers.
  • Supercookies.

3 0
3 years ago
Other questions:
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • Stella is a bank executive. She is preparing a spreadsheet on the loan repayment schedules of customers. Which function can she
    9·1 answer
  • Web 2.0 has led to a shift just from consuming content towards what
    6·1 answer
  • What is the symbol for the relational operator 'equal to'?
    8·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    14·1 answer
  • All portions, to include subject, title, paragraphs, sub-paragraphs, graphics, tables, charts, and bullet statements, must be pr
    12·1 answer
  • What is a Network It’s a system that is used to link two or more computers and name the different types of networks.?
    11·1 answer
  • C++
    11·1 answer
  • Computers are used because they :
    9·2 answers
  • Which trait can be a positive or negative?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!