1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
3 years ago
9

Different network scenarios require the

Computers and Technology
1 answer:
Vladimir [108]3 years ago
4 0

Answer:

a) Viruses

Explanation:

Vulnerability assessment is performed by variety of tools and these can be protocol analyzer, vulnerability scanner, Honeypots, port scanners, honey nets and banner grabbing tools.

Port scanners : they are used to scan the ports which can be exploited by attackers. Most of TCP/IP applications communicate using different ports and attackers can exploit these ports if they are found vulnerable. for example : ports like 80 and 443 are commonly used for HTTP and SSL communication. 22 is used for SSH and if they are open to world then it will allow attackers to use those to get the entry into the system.

Protocol Analyzers : They are used to analyze the packet captures. tools like wireshark, tshark, these tools will help user to decode HTTP/SSL/HTTPS/FTP/RSTP or any application protocols communication. this will help user to understand any unwanted or non-anticipated traffic.

Vulnerability Scanners : They are used to detect the vulnerabilities in the network or systems. these will help administrators to get the alerts whenever there are unanticipated activity. It will have two types of scanners one is active scanner and other is passive scanner. Active scanners will keep on sending probes at the fixed time slots and passibe scanners will be in listening mode all the time. These scanners will alert when a new nodes comes up or goes down or if any system gets compromised.

Honeypots and Honey nets : They are devices or softwares which are having limited security. These devices are made vulnerable purposefully so that attackers can try and attack.  This will help softwares to detect the attackers when they try to exploit these open vulnerabilities. They are deceptions created with purpose.

Banner grabbing Tools : These are tools which will capture the banner information like HTTP protocol version, underlying operating system, open ssl versions being used, server software and similar information. these are important as it will open up potential vulnerabilities in the underlying software. for ex : SSLv3 has a vulnerability known to world and can be exploited by anyone.

You might be interested in
A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
castortr0y [4]

Answer:

Content delivery network.

Explanation:

The content delivery network is also known as a network of content distribution it is a globally decentralized network of the proxy servers and the server farms.The main aim of a content delivery network is to giving the insularity of the high accessibility and efficiency by distributing the service to the end-user.

The content delivery network is a type of hardware and software network that stores u data in different geographical locations also giving the data available on the request.

7 0
3 years ago
Aspiring graphic designers can earn a(n) certification for graphic design software, such as Photoshop and Acrobat.
kobusy [5.1K]

<u>Answer is:</u>

Yes, they earn a certification as a graphic designer


<u>Explanation:</u>

And they can do everything that graphic designer do, so that is why they earn a certification of a graphic designer such as Photoshop and adobe illustrator.

I hope you got the answer well. Thanks

5 0
3 years ago
Read 2 more answers
The ________ option contains the formatting and placeholders for all of the items that appear on a side.
densk [106]

Answer:

Slide Layout contains the formatting and placeholders for all items that appear on a slide.

Explanation:

Slide Layout:

Slide layout option in MS PowerPoint contains formatting, placeholders boxes and positioning for all the content that you put on a slide.

Slide layout option allows you to format the contents, insert placeholders boxes for contents such as text or images and do their positioning as you want to appear on a slide. Placeholders are the dotted line containers that hold the content such as title, body text, tables, smart art graphics, charts, pictures, videos, clip art, and sounds.

Slide layout also contains the fonts, effects, colors, and the background (all these collectively known as the theme) of a slide.

However, PowerPoint includes a built-in slide layout, and you can modify these layout on your slide according to your specific needs. Furthermore, you can share your customized slide layout with other people who want to create a PowerPoint presentation.

In addition to, you can built-in standard slide layout in PowerPoint in the Slide-Master View.

If you created the slide, and you want to customize that slide according to specific requirement then you have the option to apply the built-in standard layout on that slide to save the time. Because it is a much easy and time-saving task instead of customizing your own slide from scratch such as making aligning and positioning the contents on the slide

6 0
3 years ago
Speech on inventors and inventions
vlada-n [284]
Interntors present an interesting kind of people who think in peculiar ways sometimes. This ability allows them to view certain situations in ways in which other people cannot. Because of this, they can think of new ways of how such situations can be tackled. This is how inventions are born. A person with an inventive mind sees a new situation where he thinks of a new solution how he could improve this situation with his invention.

This process is continued continuously with new generations of inventors seeing and coming back to old situations over and over again, inventing new things along the way. 
4 0
3 years ago
I will give Brainliest to the best answer, I need urgent HELP
laila [671]
The answer is B. Range
4 0
3 years ago
Other questions:
  • LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:
    12·2 answers
  • The Glow effect adds a blinking border around a chart.<br> t or f
    15·1 answer
  • Hey does anybody know how to delete history on a school-issued chrome book, I tried to delete it but it won't let you clear your
    7·1 answer
  • Ideally an entity identifier is composed of _____ attribute(s).
    11·1 answer
  • Given an int variable k, an int array incompletes that has been declared and initialized, an int variable nIncompletes that cont
    6·1 answer
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • Universal Containers has two customer service contact centres and each focuses on a specific product line. Each contact centre h
    7·1 answer
  • True or false a computer with a high efficiency rating should stay cooler than one with a low effiency rating
    9·1 answer
  • What is computer software​
    9·1 answer
  • the first thing to do when your computer gives you an error message is A restart the computer B press the F2 key C write down th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!