1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nataly862011 [7]
2 years ago
11

If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo

uld running the following command be a bad idea?
Computers and Technology
2 answers:
Juliette [100K]2 years ago
8 0

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

Angelina_Jolie [31]2 years ago
5 0

Answer:

The question is incomplete, the complete question is as follows:

"If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why would running the following command be a bad idea? nmap 10.16.0.0/16. Explain your answer"

<em>Running the command would be a bad idea because Nmap 10.16.0.0/16 will search for and list all the subnets for the host 10.16.0.0 which are 256 in number.It will be better to rather use the command -sl 10.16.0.0/16 at first. This feature simply enumerates every IP address in the given target range and does a reverse-DNS lookup (unless -n was specified) on each</em>.

Explanation:

Let us look deeper into meaning of Nmap. Nmap is short for Network Mapper. It is an open source security tool for network exploration, security scanning and auditing. However, nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this is to explain better use of nmap command line tool to scan a host and/or network, so to find out the possible vulnerable points in the hosts.  

It was originally written by Gordon Lyon and it can answer the following questions easily:

i.  What computers did you find running on the local network?

ii. What IP addresses did you find running on the local network?

iii. What is the operating system of your target machine?

iv. Find out what ports are open on the machine that you just scanned?

v.  Find out if the system is infected with malware or virus.

vi. Search for unauthorized servers or network service on your network.

vii. Find and remove computers which don’t meet the organization’s minimum level of security.

Regarding this topic, we will deal with question vi that nmap can answer as above.

Like I said earlier, the best bet is to use the -sl nmap command(Nmap list scan) as it is can easily detect for vulnerability by showing names using DNS listing. The names of the hosts can hint at potential vulnerabilities and allow for a better understanding of the target network, all without raising suspicion by users on the network. Also, this Nmap list scan double-checks that the ip ranges being checked for vulnerabilities are correct for the particular company or network in oorder not to make a mistake by hacking another company's ip unnecessarily.

You might be interested in
Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
yarga [219]

Answer:

d. Yes, the interpreter will catch any syntax errors.

Explanation:

I just took the quiz and got the answer right, so I figured I'd share it here to help everyone out :3

Have a great day everyone, and keep those grades up!

4 0
2 years ago
Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
Olegator [25]
All of them are persistent (will survive a reboot). A CD-rom may also be immutable, if it can't be rewritten.
7 0
3 years ago
What formula would you enter to add the values in cells b4, b5, and b6?
Semenov [28]
=SUM(b4:b6)  If it doesn't show the $ sign just make sure it's in currency :)  I hope this helped!! Good Luck!!! :)
4 0
3 years ago
A software program that allows a programmer to type in code. modern versions usually make it easy to format the code on the scre
Daniel [21]
Hi!

Software programs which programmers use to write code are known as IDE's. IDE stands for an integrated development environment.

It is also sometimes called an interactive development environment.

Hopefully, this helps!
4 0
3 years ago
Which computers accuracy is much higher(i.e.analog &amp; digital )​
siniylev [52]

Answer:

digital

Explanation:

digital because it is a lot you are and you can find out more from it

7 0
2 years ago
Other questions:
  • AMSCO networks plans to conduct a poll of viewers during the SuperBowl. They will conduct analysis to determine which area of th
    6·2 answers
  • Attacker player X is standing still on a corner kick, as the ball is played, he jumps up with his arms flailing above his should
    8·1 answer
  • Learning about public speaking can help improve your ________________.
    15·1 answer
  • To add text to a blank slide layout, _____.
    8·2 answers
  • True or False?
    8·1 answer
  • A computer is unable to access the network. when you check the led lights near the computer's network port, you discover the lig
    6·1 answer
  • Suppose you're currently completing an examination online. When you're finished, you click on Reset Exam. Why would you do this?
    8·1 answer
  • Mac or PC (need opinions please)<br><br> Why did you choose Mac/PC?
    10·2 answers
  • ________ are chunks of software - installed on one's computer, tablet, or smartphone - that are gateways to games, online resour
    8·1 answer
  • What is the output by the code system.out.print(8-4+2);
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!