1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
2 years ago
7

You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the serve

rs are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use
Computers and Technology
1 answer:
masha68 [24]2 years ago
3 0

Answer:

Port scanner.

Explanation:

A server can be defined as a specialized computer system that provides specific services for its clients on request. An example is a web server.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address.

In this scenario, the tool you should use is a port scanner because it would scan all packets that are sent or received by the server i.e all packets that are being transmitted to and from the server.

You might be interested in
Which list method allows elements in a sequence to be removed and added at either end of the structure?
Amanda [17]

Answer:

b) queue

Explanation:

Queue is also an abstract data type or a linear data structure, just like stack data structure, in which the first element is inserted from one end called the REAR(also called tail), and the removal of existing element takes place from the other end called as FRONT(also called head).

4 0
3 years ago
Read 2 more answers
What would be the best course of action for the scenario below? A user has a large amount of data that she or he needs to store.
horrorfan [7]
Bluetooth connection data on nonvolatile storage media such as a USB
7 0
3 years ago
What is Gpu in simple terms ​
Bingel [31]
Graphic processing unit !!?????!!??!??!?!!?!!?
5 0
2 years ago
Read 2 more answers
Which of these steps comes first in the boot process
strojnjashka [21]

Answer:

Missing Reference

Explanation:

7 0
2 years ago
_______ requirements are courses that build knowledge and skills in a specific
snow_tiger [21]
B. Specialization :))
7 0
2 years ago
Other questions:
  • Properly defined the primary part of a CPU​
    5·1 answer
  • What is the multiplier effect, and how can you prevent if from happening?
    13·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • A computer record is used to store all the information about one transaction, but several such records must be used to store the
    12·1 answer
  • James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
    6·1 answer
  • Which element of a presentation program’s interface displays the slide you are currently creating or editing?
    14·2 answers
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a ___
    14·1 answer
  • Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
    9·1 answer
  • associate true with the variable has_dups if the list list1 has any duplicate elements (that is if any element appears more than
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!