1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Contact [7]
3 years ago
8

A security administrator is conducting a penetration test on a network. he connects a notebook system to a mirror port on a netw

ork switch. he then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts.
Computers and Technology
1 answer:
svetoff [14.1K]3 years ago
7 0

Active fingerprinting is the process the administrator use in the penetration test and the following uses hacking techniques to actively discover inner vulnerabilities is Penetration testing also <span>vulnerability scanning is made within the security perimeter; penetration testing is performed outside of the security perimeter.</span>

You might be interested in
The MIQ inventory measures how much you value status. What are measures of status?
Alina [70]
When we're taking about measures of status, we're talking about either a socioeconomic perspective or something else. When we're talking about a socioeconomic perspective of status, there are two important measures. One would be social standing of a person and the other would be his economic standing. 
3 0
4 years ago
A computer system has a 32KB, 8-way set associative cache, and the block size is 8 bytes. The machine is byte addressable, and p
vagabundo [1.1K]

Answer:

Offset bits: 3-bits

Set number of cache: 12-bits

Tag bits: 7-bits

22-bit physical address

Explanation:

Since the system is 32K so,

=2⁵.2¹⁰

=2¹⁵

As we know that it is 8-way set associative so,

=2¹⁵/2³

=2¹⁵⁻³

=2¹²

2¹² are cache blocks

22-bit physical address

Off-set bits are 3 as they are calulated from 8-way set associative information.

Set number of cache : 12-bits

For tag-bits:

Add off-set bits and cache bits and subtract from the total bits of physical address.

=22 - (12+3)

=22 - 15

=7

3 0
3 years ago
The questions are in the pictures, i basically have to create a web page, drop the html code and files below thank you.
matrenka [14]

This contains pretty much what you need:


<!DOCTYPE html>



<html>


<head>


   <meta charset="utf-8" />


   <title>The Page Title</title>


</head>


<body>



   <h1>First paragraph</h1>


   <p>This is a paragraph of text.</p>


   <h2>Second level paragraph</h2>


   <p>


       Here is an unordered list of options:


       <ul>


           <li>First</li>


           <li>Second</li>


           <li>Third</li>


       </ul>


       Here is another unordered list of options:


       <ul>


           <li>First</li>


           <li>Second</li>


           <li>Third</li>


       </ul>


       Here is an ordered list of options:


       <ol>


           <li>First</li>


           <li>Second</li>


           <li>Third</li>


       </ol>


   </p>


   <h4>Third level</h4>



</body>


</html>

3 0
4 years ago
System analysis and design
Oksana_A [137]

Answer:

teachers go hard on you dont they

Explanation:

5 0
4 years ago
Programmers employ the acronym ____ to mean that if your input is incorrect, your output is worthless.
Nataly [62]
The answer is GIGO or the garbage in, garbage out. It is an idea regular to software engineering and science: the nature of yield is dictated by the nature of the information. In this way, for instance, if a scientific condition is disgracefully expressed, the appropriate response is probably not going to be right. It has a tendency to be utilized when discussing information section and databases. Essentially it implies that in the event that you enter off base or wrong information then you have truly entered waste.
8 0
3 years ago
Other questions:
  • Identify the publisher in this citation:Carter,Alan.A guide to Entrepreneurship.New York: River’2008.Print.
    9·1 answer
  • Which programming component provides a temporary, named storage location in computer memory that cannot change during program ex
    6·1 answer
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • What is a basic operation of computers
    13·1 answer
  • Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
    15·1 answer
  • Jacobson furniture pseudo-code
    8·1 answer
  • If a user has one column in a table and would like to make it into two columns which command should be used?
    8·2 answers
  • g How safe is to have a LinkedIn account where you have published all the important information about yourself
    13·2 answers
  • What is the difference between second generation and third generation​
    15·1 answer
  • Databases containing the research, writing and studies conducted by Academic
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!