1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
11

If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo

uld running the following command be a bad idea?
Computers and Technology
2 answers:
Juliette [100K]3 years ago
8 0

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

Angelina_Jolie [31]3 years ago
5 0

Answer:

The question is incomplete, the complete question is as follows:

"If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why would running the following command be a bad idea? nmap 10.16.0.0/16. Explain your answer"

<em>Running the command would be a bad idea because Nmap 10.16.0.0/16 will search for and list all the subnets for the host 10.16.0.0 which are 256 in number.It will be better to rather use the command -sl 10.16.0.0/16 at first. This feature simply enumerates every IP address in the given target range and does a reverse-DNS lookup (unless -n was specified) on each</em>.

Explanation:

Let us look deeper into meaning of Nmap. Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this is to explain better use of nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.  

It was originally written by Gordon Lyon and it can answer the following questions easily:

i.  What computers did you find running on the local network?

ii. What IP addresses did you find running on the local network?

iii. What is the operating system of your target machine?

iv. Find out what ports are open on the machine that you just scanned?

v.  Find out if the system is infected with malware or virus.

vi. Search for unauthorized servers or network service on your network.

vii. Find and remove computers which don’t meet the organization’s minimum level of security.

Regarding this topic, we will deal with question vi that nmap can answer as above.

Like I said earlier, the best bet is to use the -sl nmap command(Nmap list scan) as it is can easily detect for vulnerability by showing names using DNS listing. The names of the hosts can hint at potential vulnerabilities and allow for a better understanding of the target network, all without raising suspicion by users on the network. Also, this Nmap list scan double-checks that the ip ranges being checked for vulnerabilities are correct for the particular company or network in oorder not to make a mistake by hacking another company's ip unnecessarily.

You might be interested in
Nathan took a picture of his friends while they were on a field trip. He wants upload this picture to a photo-sharing site. He w
Alenkinab [10]

Answer:

photoshop

Explanation:

(if there are answer choices pls comment them and  I'll pick an answer from them, but this is just my best guess. : )

5 0
3 years ago
One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular
labwork [276]

An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

<h3>What protocol does the netstat command use?</h3>

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

<h3>What is netstat used for?</h3>

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

  • The troubleshoot of networking problems.
  • In configuration

Learn more about troubleshoot from

brainly.com/question/9572941

#SPJ1

3 0
2 years ago
The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
kenny6666 [7]

hard drive is wht the awnser is

8 0
3 years ago
What does this sign mean?
yKpoI14uk [10]
A. yield to the car on your right
8 0
3 years ago
Read 2 more answers
Lesson 1 (4.0 points)
sesenic [268]


3. Hold down the CTRL, ALT, and DELETE keys simultaneously, click Task Manager option, then right-click the frozen program's name, and finally click the end task button.


8 0
3 years ago
Read 2 more answers
Other questions:
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of p
    7·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • In this lab, your task is to complete the following: Enable all of the necessary ports on each networking device that will allow
    9·1 answer
  • Autumn suffers from nocturnal dyspnea. This term describes a breathing condition but using the prefixes to translate, it means:
    5·1 answer
  • Please its argent and I will give you BRAINLIEST ANSWER 6. How would you confirm that a colourless liquid given to you is pure w
    10·1 answer
  • Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (l
    15·1 answer
  • Write a program using for loop to find the cube of numbers from 50-100 <br> FASTT
    11·1 answer
  • What does FTTB mean?
    13·1 answer
  • The project objective is the detailed description of the characteristics of the project. True or False?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!