1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
4 years ago
11

The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se

rver to retrieve detailed information. What best describes this concern?
Computers and Technology
1 answer:
dangina [55]4 years ago
4 0

Answer:

Banner Grabbing

Explanation:

Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.

Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers.  divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.

Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.

You might be interested in
2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
True [87]

Answer:

Follows are the explanation of the choices:

Explanation:

Following are the Pseudocode for selection sort:                      

for j = 0 to k-1 do:

      SS = i

      For l = i + 1 to k-1 do:

        If X(l) < X(SS)

          SS= l

        End-If

      End-For

      T = X(j)

      X(j) = X(SS)

      X(SS) = T

    End-For

Following are the description of Loop invariants:

The subarray  A[1..j−1] includes the lowest of the j−1 components, ordered into a non-decreasing order, only at beginning of the iteration of its outer for loop.  

A[min] is the least amount in subarray A[j.. l−1] only at beginning of the each loop-inner iterations.                      

Following are the explanation for third question:

Throughout the final step, two elements were left to evaluate their algorithm. Its smaller in A[k-1] would be placed as well as the larger in A[k]. One last is the large and medium component of its sequence because most and the last two components an outer loop invariant has been filtered by the previous version. When we do this n times, its end is a repetitive, one element-sorting phase.

Following is the description of choosing best-case and worst-case in run- time:

The body the if has never been activated whenever the best case time is the list is resolved. This number of transactions are especially in comparison also as a procedure, that will be (n-1)(((n+2)/2)+4).    

A structure iterator at every point in the worst case that array is reversed, that doubles its sequence of iterations in the inner loop, that is:(n−1)(n+6) Since both of them take timeΘ(n2).

7 0
4 years ago
Dusk is considered “a magic hour” by photographers and is the time when light is the least harsh. True or false.
cricket20 [7]

True, it is considered the "magic hour" due to the lacking of the sun's golden rays

6 0
3 years ago
Read 2 more answers
Using the SUM function allows a series of numbers to be multiplied. subtracted. added. divided.
LUCKY_DIMON [66]
The sum of something is the end result of an addition problem.
8 0
3 years ago
)what item is at the front of the list after these statements are executed?
White raven [17]

Answer:

Option (a) : sam

Explanation:

  • In the given program, the queue is defined in the first step.
  • The method addToFront() adds the given element to the front of the queue. After this step is executed the front element in the queue is that element.
  • The method addToBack() adds the given element to the back of the queue. After this step is executed the back element in the queue is that element.
  • After step 1, Jack is added to the front of the queue.
  • After step 2, Rudy is added to the back of the queue.
  • After step 3, Larry is added to the back of the queue.
  • After step 4, sam is added to the front of the queue.
  • After step 5, name contains Larry as the getBack() returns the element present at the back of the queue.
  • After step 6, Adam is added to the back of the queue.
  • After executing all of the steps now the queue contains "sam" as the front element of the queue.
  • So, the correct option is "sam".
3 0
3 years ago
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
garri49 [273]

Answer:

A or S most likely (I think)

7 0
3 years ago
Other questions:
  • A company that hires only American Indians is practicing
    5·2 answers
  • A group of computers that are interconnected in order to share information or documents is called a _____
    9·1 answer
  • For a class project, Jerome builds a simple circuit with a battery and three light bulbs. On his way to school, Jerome drops his
    9·1 answer
  • An object is suspended in a wind tunnel and the force measured for various levels of wind velocity: v (m/s) 10 20 30 40 50 60 70
    10·1 answer
  • Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w
    11·2 answers
  • What is the command to display the user name with which youhave logged in?
    8·1 answer
  • Is a tv a
    6·1 answer
  • Draw
    7·1 answer
  • Hillary’s family is thinking of relocating to a different city to save money. They set up a budget comparing the cost of living
    12·1 answer
  • You're asked to recommend potential data structures to use as the backing for implementing Kruskal's algorithm. Which of the fol
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!