1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
5

Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n

etwork resources D. Defense in depth
Computers and Technology
1 answer:
inn [45]3 years ago
5 0

Answer:

A. Detecting network attacks and scans

Explanation:

Honeynet

It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .

The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .

Hence ,

The correct option is Detecting network attacks and scans .

You might be interested in
What is the definition of posture<br>​
Vinvika [58]

Answer:

The posture is how someone sits at his or her computer.

Hope this helps ;-))

6 0
3 years ago
Write a program that computes and displays a 15 percent tip when the
Anuta_ua [19.1K]
Your question wasn't very clear, but I think I understand what you want. Additionally, you should really state what language you're working with. Here it is in C#, and shouldn't be too much of a hassle to translate in to other languages.


Console.Write("Enter payment: ");

float payment;

if (float.TryParse(Console.ReadLine(), out payment))
    Console.WriteLine((Math.Floor(payment * 100) / 100) * 0.15, + " at 15% tip.");
else
    Console.WriteLine("Invalid input.");
5 0
3 years ago
What will the document.write() statement display, given the following code snippet? var scores = new Array[94, 90, 88, 82, 73, 7
astra-53 [7]

Answer:

There are 7 scores recorded. The dropped score is 75

Explanation:

The code snippet above prints through the document.write() function. the output prints the string serving as the argument, and makes use of variables (lgth) and expression also (scores [lgth -1]). what it does is. From the point where it sees +lgth+, it checks the value, which is 7. And when it sees scores [lgth-1] it evaluates it to 75. Hence, the string above is produced.

4 0
3 years ago
What is the memory of a computer called
Nataliya [291]
It is called Ram in another term for memory :)
6 0
3 years ago
Read 2 more answers
_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
gladu [14]

Answer:

Downloadable

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.

For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.

4 0
3 years ago
Other questions:
  • ________ symbol is used in the "Advanced" section of the time range picker to round down to nearest unit of specified time.
    8·1 answer
  • The benefits associated with AAA are increased security, increased control over the network, and the capability of auditing your
    12·1 answer
  • Write a method reverse( ) for OurLinkedList class. The method should return a new OurLinkedList object that is the reverse of th
    8·1 answer
  • What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation
    6·1 answer
  • ¿En cuales situaciones concretas se puede aplicar las técnicas de conteo(particularmente las permutuaciones y las combinaciones)
    11·1 answer
  • A method that determines if a list is empty in a consistently written linked list class that uses a reference first to point to
    13·2 answers
  • Select the correct answer.
    11·1 answer
  • How many types of window in Qbasic​
    7·1 answer
  • Please help ASAP! will mark brianliest! 30 points!
    14·1 answer
  • search engines use software that combs the web to find webpages and add new data about them to the database. what is this softwa
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!