1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
3 years ago
11

If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo

uld running the following command be a bad idea?
Computers and Technology
2 answers:
Juliette [100K]3 years ago
8 0

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

Angelina_Jolie [31]3 years ago
5 0

Answer:

The question is incomplete, the complete question is as follows:

"If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why would running the following command be a bad idea? nmap 10.16.0.0/16. Explain your answer"

<em>Running the command would be a bad idea because Nmap 10.16.0.0/16 will search for and list all the subnets for the host 10.16.0.0 which are 256 in number.It will be better to rather use the command -sl 10.16.0.0/16 at first. This feature simply enumerates every IP address in the given target range and does a reverse-DNS lookup (unless -n was specified) on each</em>.

Explanation:

Let us look deeper into meaning of Nmap. Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this is to explain better use of nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.  

It was originally written by Gordon Lyon and it can answer the following questions easily:

i.  What computers did you find running on the local network?

ii. What IP addresses did you find running on the local network?

iii. What is the operating system of your target machine?

iv. Find out what ports are open on the machine that you just scanned?

v.  Find out if the system is infected with malware or virus.

vi. Search for unauthorized servers or network service on your network.

vii. Find and remove computers which don’t meet the organization’s minimum level of security.

Regarding this topic, we will deal with question vi that nmap can answer as above.

Like I said earlier, the best bet is to use the -sl nmap command(Nmap list scan) as it is can easily detect for vulnerability by showing names using DNS listing. The names of the hosts can hint at potential vulnerabilities and allow for a better understanding of the target network, all without raising suspicion by users on the network. Also, this Nmap list scan double-checks that the ip ranges being checked for vulnerabilities are correct for the particular company or network in oorder not to make a mistake by hacking another company's ip unnecessarily.

You might be interested in
What typically happens by default when a file is double clicked in Microsoft Windows?
Ket [755]
<span>When a file is double clicked in Microsoft Windows typically the file opens or executes.</span>
For many people the<span> time in which they have to do two quick clicks of the left mouse button is too short. </span>
There is an option to adjust<span> the </span>double-click speed.<span> This can be done on the Buttons tab, under </span>Double-click speed.
3 0
3 years ago
How many nibbles make one kilobyte​
Kazeer [188]
2000 nibbles I think correct me if I’m wrong
5 0
3 years ago
Read 2 more answers
Identify the primary responsibilities associated with each of the following web design roles: content writer/editor, artist/grap
frosja888 [35]

A web designer/developer is responsible for the design, layout and coding of a website. They are involved with the technical and graphical aspects of a website and how the site works and how it looks.

Explanation:

  • A content writer/editor creates and revises the text that visitors read when the visit a website, choose a link, image, video, or other media that enhances your text content.
  • A web artists/graphic designer's responsibility is to create original art, such as logos, stylized typefaces, and avatars, and props for virtual 3-d worlds.
  • A web designer's role is to create webpages that combine, text, images, and links using tools such as markup languages; CCS, HTML, and WYSIWYG editors.
  • Web programmer/database developer's job is to script languages such as, JavaScript, ASP, PHP, and MYSQL and must plan, create, secure, and maintain databases of varying complexity.
  • Web Administrator assumes all roles, including creative, high-tech, and oversight. May oversee a web development team that includes technical and creative roles.
5 0
3 years ago
A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust
nikklg [1K]

Answer:

You will need to implement a for loop ( I am assuming this is java)

Explanation:

int count20s = 0;

for(int x =0; x< customerAges.length;x++){

if(20 <= customerAges[x] && customerAges[x] <= 29){

     count20s++;

}

4 0
3 years ago
The retention of encoded information over time is called storage. A measure of memory storage that involves identifying informat
Anni [7]

Answer: ask google and search quizlet by it , it will show you

Explanation:

7 0
3 years ago
Other questions:
  • When a crystal grows in unrestricted space, how does growth occur?
    14·2 answers
  • With network management software, a network manager can ____.
    6·1 answer
  • What is the output of the following function if the array nums contains the values 1 2 3 4 5 int backwards(int nums[]) { for (x
    15·1 answer
  • Explain why an IT department and a user support group may disagree about the responsibility for the development of end-user appl
    8·1 answer
  • An application with which you can perform calculations on numbers and work with other data
    8·1 answer
  • after placing her insertion point after grandma's kitchen, order the steps Danica needs to follow to insert and format the regis
    12·2 answers
  • Which of the following is true regarding data analysis? a. Disciplines and professions do not provide guidance on data analysis.
    6·2 answers
  • Write a list comprehension statement to generate a list of all pairs of odd posi
    7·1 answer
  • Graphics created within Illustrator CC are always vector graphics true or false
    9·1 answer
  • Every windows service has the 3 start types what are those service types?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!