1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
8

A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw

ork switch. he then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts.
Computers and Technology
1 answer:
svetoff [14.1K]3 years ago
7 0

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

You might be interested in
Write a program that will calculate the following function:
anyanavicka [17]
Shshshshshshsjsjsjsjjsjdhdhhddhhd
8 0
3 years ago
Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
Zina [86]

Answer:

  General purpose graphics primitives that contain 2D graphic library as, it is used in graphics processing unit which typically manage computation for computer graphics. Graphic primitives contain basic element such as lines and curves. Modern 2D computer graphic system that operate with primitives which has lines and shapes. All the elements of graphic are formed from primitives.

8 0
3 years ago
What is an example of using the Internet of Things (IoT) to deliver innovative Cloud based solutions to customers?
VladimirAG [237]

An example of using the Internet of Things (IoT) to deliver innovative Cloud-based solutions to customers is: A. wearable technology that provides customers with on-the-spot personalized experiences.

<h3>What is cloud computing?</h3>

Cloud computing can be defined as a Cloud-based solutions that typically requires the use of shared computing resources over the Internet, rather than using local servers, wired-connection and hard drives to provide various services to customers.

In Computer technology, a good example of an application of the Internet of Things (IoT) to deliver innovative Cloud-based solutions to end users is wearable technology that is designed and developed to provide users with on-the-spot personalized experiences.

Read more on cloud computing here: brainly.com/question/19057393

#SPJ1

<u>Complete Question:</u>

What is an example of using the Internet of Things (IoT) to deliver innovative Cloud-based solutions to customers?

A. wearable technology that provides customers with on-the-spot personalized experiences

B. scheduled conferences with brand ambassadors to pitch customers on new offers

C. customers using a PC connected to a local network to search for recommendations

D. online surveys that gather customer input to improve services in the future

E. I don't know this yet.

8 0
2 years ago
if a network security professional wants to connect some computers in the same building without it using a router what type of n
marta [7]

Answer:

 the MAC addresses of wireless NICs

Explanation:

8 0
3 years ago
Read 2 more answers
3. Which of the following is the best definition of a workplace policy?
Oksi-84 [34.3K]

The best definition of a workplace policy is: d. the standard course of action adopted by a business.

Workplace policies are a company’s standard rules of what should and should not be done by its workforce. These policies are strictly enforced as the workforce’s actions reflects the company. Failure to comply with these policies may lead to a member of the workforce’s removal from the business.

6 0
4 years ago
Other questions:
  • James Hutton:
    8·1 answer
  • Darian has a gourmet cupcake business and needs a website to compete with the other bakeries in his area. He has a Google My Bus
    15·1 answer
  • Who can pick up GPS signals
    14·1 answer
  • Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time f
    12·1 answer
  • Write a MASM program to calculate Fibonacci numbers:
    10·1 answer
  • Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas
    9·1 answer
  • In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message
    11·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • Potterheadler varmı burada​
    10·2 answers
  • What is an insertion point?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!