1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
7

You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the serve

rs are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use
Computers and Technology
1 answer:
masha68 [24]3 years ago
3 0

Answer:

Port scanner.

Explanation:

A server can be defined as a specialized computer system that provides specific services for its clients on request. An example is a web server.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address.

In this scenario, the tool you should use is a port scanner because it would scan all packets that are sent or received by the server i.e all packets that are being transmitted to and from the server.

You might be interested in
When using a software budget, you should feel very confident if you choose a solution that looks like it will come in exactly on
ludmilkaskok [199]

Answer:

probably false

Explanation:

because u dont want a budget to b exact u want it completely covered

3 0
3 years ago
Absolute time would be most similar to :
Luda [366]
The absolute time would be most similar to a fact. It was theorised and in fact, approved by scientists as a scientific law which governs, according to Wikipedia, as a "<span>true and mathematical </span>time<span>, of itself, and from its own nature flows equably without regard to anything external, and by another name is called duration: relative, apparent and common </span><span>time."</span>
3 0
4 years ago
Help !!!!!
viva [34]
I believe it’s D because software is the programs and other operations used by a computer
3 0
3 years ago
Linda is making handouts for her upcoming presentation. She wants the handouts to be comprehensible to people who do not attend
Ludmilka [50]

The correct answer is; provide a printout of her slideshow.

Further Explanation:

Linda should provide the printout of the slideshow for the people who could not attend the presentation. This way they are getting clear and concise information that they missed. They will have all the details she gave in person and will not be lacking any of the important information.

She can do this by using the "print notes" on her page if there is that option available. If not, she can use another method. Linda should make sure that each person received their copy either via office mail or email. She can also email her coworkers and ask them to pick up their copy at their convenience.

Learn more about slideshows at brainly.com/question/11837867

#LearnwithBrainly

4 0
3 years ago
Write a function called mul_time that takes a Time_Elapsed object and a number and returns a new Time_Elapsed object that contai
lisov135 [29]

# Write a function called mul_time that takes a Time object and a number and

# returns a new Time object that contains the product of the original Time and

# the number.

# Then use mul_time to write a function that takes a Time object that

# represents the finishing time in a race, and a number that represents the

# distance, and returns a Time object that represents the average pace (time

# per mile).

# Current Status: Complete

class Time(object):

   """ represents the time of day.

   attributes: hour, minute, second"""

time = Time()

time.hour = 3

time.minute = 0

time.second = 0

def time_to_int(time):

   minutes = time.hour * 60 + time.minute

   seconds = minutes * 60 + time.second

   return seconds

def int_to_time(seconds):

   new_time = Time()

   minutes, new_time.second = divmod(seconds, 60)

   time.hour, time.minute = divmod(minutes, 60)

   return time

def mul_time(time, multicand):

   time_int = time_to_int(time) * multicand

   new_time = int_to_time(time_int)

   if new_time.hour > 12:

       new_time.hour = new_time.hour % 12

#    print ("New time is: %.2d:%.2d:%.2d"

#    % (new_time.hour, new_time.minute, new_time.second))

   return new_time

# mul_time(time, 2)

def race_stats(time, distance):

   print ("The finish time was %.2d:%.2d:%.2d"

         % (time.hour, time.minute, time.second))

   print "The distance was %d miles" % (distance)

   average = mul_time(time, (1.0 / distance))

   print ("The average is: %.2d:%.2d:%.2d per mile"

         % (average.hour, average.minute, average.second))

race_stats(time, 3)

7 0
2 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. .
    12·1 answer
  • Write a functionvector merge(vector a, vector b)that merges two vectors, alternating elements from both vectors. If one vector i
    8·1 answer
  • The fastest way to get help is to type a word or two in the search box.
    7·1 answer
  • Design a class FileArray that has a static method named writeArray. The method should take two arguments: the name of a file and
    11·1 answer
  • Preparing for jobs that are high in demand allow you to...
    11·1 answer
  • Why is a Quality assurance tester needed on a software development team?
    5·1 answer
  • In your own view, how can social media be used in teaching and learning in higher education?
    10·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!