1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
11

If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo

uld running the following command be a bad idea?
Computers and Technology
2 answers:
Juliette [100K]3 years ago
8 0

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

Angelina_Jolie [31]3 years ago
5 0

Answer:

The question is incomplete, the complete question is as follows:

"If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why would running the following command be a bad idea? nmap 10.16.0.0/16. Explain your answer"

<em>Running the command would be a bad idea because Nmap 10.16.0.0/16 will search for and list all the subnets for the host 10.16.0.0 which are 256 in number.It will be better to rather use the command -sl 10.16.0.0/16 at first. This feature simply enumerates every IP address in the given target range and does a reverse-DNS lookup (unless -n was specified) on each</em>.

Explanation:

Let us look deeper into meaning of Nmap. Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this is to explain better use of nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.  

It was originally written by Gordon Lyon and it can answer the following questions easily:

i.  What computers did you find running on the local network?

ii. What IP addresses did you find running on the local network?

iii. What is the operating system of your target machine?

iv. Find out what ports are open on the machine that you just scanned?

v.  Find out if the system is infected with malware or virus.

vi. Search for unauthorized servers or network service on your network.

vii. Find and remove computers which don’t meet the organization’s minimum level of security.

Regarding this topic, we will deal with question vi that nmap can answer as above.

Like I said earlier, the best bet is to use the -sl nmap command(Nmap list scan) as it is can easily detect for vulnerability by showing names using DNS listing. The names of the hosts can hint at potential vulnerabilities and allow for a better understanding of the target network, all without raising suspicion by users on the network. Also, this Nmap list scan double-checks that the ip ranges being checked for vulnerabilities are correct for the particular company or network in oorder not to make a mistake by hacking another company's ip unnecessarily.

You might be interested in
Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
maxonik [38]
Is this a question ?
3 0
3 years ago
Universal Containers uses an Auto-numbering system to uniquely identify each support request. They want customers to know this n
Nookie1986 [14]

Answer:

Following are the answers.

  • Auto-response Rules
  • Case Comment Notifications

Explanation:

They use the following system to determine that requirement for help in such a special manner. They need folks to identify the amount at the earliest opportunity. So, these Auto-response Rules and Case Comment Notifications are the functionalities that the System Admin implements to provide customers to easily obtain certain data are as follows.

8 0
3 years ago
Could someone explain a Boolean?
Kruka [31]

Answer:

It is a "True" or "False" integer.

Explanation:

denoting a system of algebraic notation used to represent logical propositions, especially in computing and electronics.

a binary variable, having two possible values called “true” and “false.”.

3 0
3 years ago
Read 2 more answers
When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive fo
disa [49]

Answer:

great enough to overcome.

Explanation:

Kinetic energy can be defined as an energy possessed by an object or body due to its motion.

Mathematically, kinetic energy is given by the formula;

Where, K.E represents kinetic energy measured in Joules.

M represents mass measured in kilograms.

V represents velocity measured in metres per seconds square.

A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.

When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.

Basically, the phase change includes solid, liquid and gas.

8 0
3 years ago
I'm stuck on this Java exercise problem and don't know how to organize my code with proper formatting and it's not helping that
Volgvan

In your "count spaces method" before the for loop, you want to declare an int variable (let's call it spc)

then, each time you find that charat, spc++.


also, the string must be declared in the main method, not the spaces count method.


The actual code:


public class CountSpaces{

public static void main(String[] args){

String instring = "(your quote here)";

int spaces = calculateSpaces(instring);

System.out.println("The number of spaces is " + spaces);

}

public static int calculateSpaces(String in){

int spc = 0;

for(int i= 0; i<in.length; i++){

if(in.charAt(i)== ' '){

spc++;

}

}

return spc;

}

}


that should be it.  If you have any questions, feel free to reach out.

4 0
3 years ago
Other questions:
  • In which type of attack does the user respond to several external communication requests? Harry wants to watch a movie online by
    14·1 answer
  • How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my
    5·1 answer
  • If one breakfast meal of banana lacatan, scrambled egg, plain rice, and hot milk contains 58 grams carbohydrate, 12 grams protei
    11·1 answer
  • How is this fictional tex in the people could fly different from the nonfictional text​
    12·2 answers
  • The individual accountable for ensuring the day-to-day operation of the InfoSec program, accomplishing the objectives identified
    7·1 answer
  • How many dog breed are there
    9·2 answers
  • I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right b
    14·1 answer
  • Write a class Bug that models a bug moving along a horizontal line. The bug moves either to the right or left. Initially, the bu
    13·1 answer
  • Three types of query​
    13·1 answer
  • The most important part of a computer​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!