1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
12

A hacker scanning a web server is likely to be identified by the target's web a. Because of the FBI's Carnivore scanning program

. b. With help from the ISP's logs. c. Through the target's web server's logs. d. By the local phone company's forensic investigators. e. None of the above.
Computers and Technology
1 answer:
eduard3 years ago
5 0

Answer:

C

Through the target's web server's log.

Explanation:

A web server is a server software or a hardware that is fully dedicated to the running of that software. It satisfies a user's request on the www that is the World Wide Web. A web server can, contain just one or more websites.

It processes incoming network requests over HTTP and several other related protocols.

It also stores the webpages the user have visited in the past. Tracking the target's web server to know what enter or left can expose the hacker that is scanning a user's web server.

You might be interested in
This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
faltersainse [42]

Answer:

C. System

Explanation:

System softwares are softwares designed to create a working environment for other types of softwares. They manage the activities of application softwares, provide utility software services and control, maintain and optimise the performance of hardware components in the computer system.

The application software is designed for user task function, that is, the users uses the software for defined purposes. Utility software is used to control, analyse, maintain and optimise system performance.

4 0
3 years ago
The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
IrinaVladis [17]

Answer:

Tunnel Mode.

Explanation:

When we are using a VPN that uses a tunnel mode it sets the server location of the user to not it's real location but some other location that the user wants or the default location in the VPN.

When an packet is intercepted it does not reveal anything about the right destination system.

Hence we conclude that the answer is tunnel Mode.

8 0
3 years ago
What will be displayed if the following Java code segment is run? System.out.println("one "); System.out.print("two "); System.o
Morgarella [4.7K]

I'm not familiar with Java, but I'm familiar with C#.

Ok, back to the point. Those lines will print in your console: "One", "Two" and "Three"

8 0
3 years ago
A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or
wariber [46]

Answer: Company rights

Explanation:

A company rights policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.

It is one of the most important documents governing the rights of a company.

6 0
3 years ago
Which device or software application detects errors in system configurations?
amm1812
Error-correcting code memory
5 0
3 years ago
Other questions:
  • Which computer is the best for video cutting?
    11·2 answers
  • Which is not an element of photography? a Cropping b Height c Directional Lighting d Framing
    11·1 answer
  • Count positive and negative number and compute the average. The program will have the user input an unspecified number of intege
    6·1 answer
  • Which would you trade on a stock exchange? A: Shares B: Bonds C: Annuities
    6·2 answers
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • The term integration mean?
    7·2 answers
  • 2. The Internet could best be described as: *
    12·1 answer
  • High level languages are closer to machine language than humans yes or no​
    12·2 answers
  • State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translat
    14·1 answer
  • In Outlook 2016, the Tell Me function can be accessed by
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!