1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
15

Your client has asked you to run an NMAP scan against the servers they have located in their DMZ. They would like you to identif

y the OS. Which of the following switches would be your best option?A. nmap -P0
B. nmap -sO
C. nmap -sS
D. nmap -O
Computers and Technology
1 answer:
UNO [17]3 years ago
5 0

Option D is the correct answer

nmap -O

Explanation:

  • DMZ means a demilitarized zone it will have more than 1 firewall to protect the server.
  • Nmap is the 1st step of ethical hacking in penetration testing for detecting the required detail from the server.
  • Nmap is used to scan the network and detect the host.
  • Nmap scanning can also be used to receive packets from the server without the trace of the client.
  • Nmap -O is used to detect the OS of the server and its version also.

You might be interested in
Heelo how do u do python syntax lesson 11 on code academy
pochemuha

have you tried www.khanacademy.org 


3 0
3 years ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Can someone help me asap​
vichka [17]

Sorry but Your screwed

4 0
3 years ago
Which of the following can indicate what careers will be enjoyable ?
pishuonlain [190]

Answer: c. Interests

Explanation:

A person's interests are things that they love to do because they find those things to be enjoyable for example, gaming, writing or travelling.

To find out what careers a person would find enjoyable therefore, the interests can be looked at because if the person enjoy doing those things without it even being a job then they would probably enjoy those things in a career setting as well. For instance a person who enjoys writing would probably find a career in jornalism to be enjoyable.

5 0
3 years ago
Why do you feel an organization has multiple layers of security in place to protect its operation?
aalyn [17]

The purpose of including multiple layers in your network security<span> is to make sure that </span>each single defense component has a backup<span> in the case of a flaw or missing coverage. The individual strengths of each layer also cover any gaps that other defenses may lack.</span>

With this assumption in mind, each individual layer in a multi-layered security approach focuses on a specific area where the malware could attack. By working in concert, these layers of security offer a better chance of stopping intruders from breaching company networks than using a single solution.

The types of security layers you can use in your network defense include:

<span>Web protectionPatch managementEmail security and archivingVulnerability assessment and analyticsAntivirus softwareData encryptionFirewallsDigital certificatesAnti-spam and spam filtersPrivacy controls</span>

<span>Having multiple layers of security in place is crucial for MSPs who protect data at all levels and across numerous applications and devices. Not only should data stay safe, but so should the methods of communication and the network where information is transferred.</span>

4 0
3 years ago
Other questions:
  • For film editors, which task comes last in their workflow pattern?
    12·2 answers
  • wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?
    12·1 answer
  • A database is used instead of a spreadsheet when?
    7·1 answer
  • Create a new file that contains a summary of the total consumption for three sectors: "Residential," "Commercial," and "Industri
    10·1 answer
  • Sulfur content is measured in
    11·1 answer
  • What are the top and side margins for a letter typed in standard format?
    5·1 answer
  • The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a compute
    7·1 answer
  • An e-commerce client is moving from on-premise, legacy systems to a cloud-based platform. During the transition, the client is a
    6·1 answer
  • Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC t
    14·1 answer
  • Html is a markup language that lets you identify common sections of a web page
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!