1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
8

A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw

ork switch. he then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts.
Computers and Technology
1 answer:
svetoff [14.1K]3 years ago
7 0

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

You might be interested in
Does anyone know what this logo is??
scoray [572]

Answer:

I have got no idea it looks like an older style

8 0
2 years ago
Read 2 more answers
11. What are the two DFS models?12.When you move a file from the Spreadsheets folder to the Corp Documents folder on a Windows S
Vesnalui [34]

Answer/Explanation:

11. Standalone and Domain-based models

12. The moved file takes with it the permission it had in the Spreadsheets folder.

Cheers.

7 0
3 years ago
Write a SQL statement to display the WarehouseID, the sum of Quantity On Order, and the sum of QuantityOnHand, grouped by Wareho
mariarad [96]

Answer:

The corrected question is:

Write an SQL statement to display the WarehouseID, the sum of QuantityOnOrder and sum of QuantityOnHand, grouped by WarehouseID and QuantityOnOrder. Name the sum of QuantityOnOrder as TotalItemsOnOrder and the sum of QuantityOnHand as TotalItemsOnHand. Use only the INVENTORY table in your SQL statement.

Answer to this corrected question:

SELECT WarehouseID,

SUM(QuantityOnOrder) AS TotalItemsOnOrder,

SUM(QuantityOnHand) AS TotalItemsOnHand

FROM INVENTORY

GROUP BY WarehouseID, QuantityOnOrder;

According to the given question:

SELECT WarehouseID,

SUM(QuantityOnOrder) + SUM(QuantityOnHand) AS TotalItemsOnHand    

FROM INVENTORY

GROUP BY WarehouseID, QuantityOnOrder;

Explanation:

  • In the SQL statement SELECT statement is used to select the data from the table. Here the SELECT statement is used to select WarehouseID, Sum of the columns QuantityOnOrder and QuantityOnHand from INVENTORY table.
  • The sum of QuantityOnOrder and QuantityOnHand columns are given the name of TotalItemsonHand (In case of the corrected question the sum of column QuantityOnOrder is named as TotalItemsOnOrder and the column QuantityOnHand is named as TotalItemsOnHand ) using Alias AS. Alias is the temporary name given to the columns or table to make them  more readable.
  • GROUP BY statement is used to arrange or "group" same data and is often use with aggregate functions like SUM function here. So the grouping here is done based on two columns WarehouseID and QuantityOnOrder.
  • SUM function in this SQL statement is an aggregate function to calculate the sum of all value in the columns QuantityOnOrder and QuantityOnHand.
3 0
3 years ago
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program
d1i1m1o1n [39]

Explanation:

I thinkcreating and edditing Images matchs to adobePhotoshop

Microsoft word is for adding and Creating text document

Creating andeditingpage layout -Adobe In Design

Desktop Publication-QuarkQuark Xpress

I hope thishelp and If wrong Inform me

Good luck

8 0
3 years ago
Read 2 more answers
What is radio frequency identification used for
Sauron [17]

Answer:

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter.

Radio Frequency Identification (RFID) is a technology designed to allow objects, animals and even human beings to be identified, located, and tracked using radio frequency signals.

8 0
3 years ago
Other questions:
  • Which practice represents the trait of effective communication?
    6·2 answers
  • can An intelligent workplace uses technology to allow workers to be productive whether they are in the office or working from ho
    12·1 answer
  • What is the program that searches through data bases?
    10·1 answer
  • The RESET circuit used on the four 3-Bit Counters analyzed in this activity reset the counts to zero (000). It makes sense for t
    14·1 answer
  • A collection of realated files is called a
    12·1 answer
  • How many miss Dragon Ball Abridged?
    5·2 answers
  • 1. Es un símbolo que indica que se ha de realizar cierta operación específica entre uno o varios
    6·1 answer
  • Please write a Java program to read movies.txt file. (It is in Modules under Chapter Code) Create your own movies.ser file from
    14·1 answer
  • Caps lock key is used to type alphabets. _________​
    6·2 answers
  • Do anyone know how to code like I need someone do a code for me?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!