1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Basile [38]
3 years ago
7

You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the serve

rs are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use
Computers and Technology
1 answer:
masha68 [24]3 years ago
3 0

Answer:

Port scanner.

Explanation:

A server can be defined as a specialized computer system that provides specific services for its clients on request. An example is a web server.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address.

In this scenario, the tool you should use is a port scanner because it would scan all packets that are sent or received by the server i.e all packets that are being transmitted to and from the server.

You might be interested in
Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have alre
Fudgin [204]

Answer:

The c++ program to implement the while loop is given below.

#include <iostream>

using namespace std;

int main() {

  // declaration of integer variables

   int k, n, total;

   // initialization of integer variables

   k=1, n=4, total=0;

//  loop executed till value of k becomes equal to value of n

   while( k <= n ){

       // cube of every integer is added to the variable total

       total = total + ( k * k * k );

       // value of k is incremented to go to the next number

k = k + 1 ;

   }  

   return 0;

}  

Explanation:

The program begins with the declaration of integer variables.  

int k, n, total;

This is followed by initialization of these variables.

k=1, n=4, total=0;

The while loop runs over the variable k which is initialized to 1. The loop runs till value of k reaches the value of integer n.

First, cube of k is computed and added to the variable total.

After first execution of the loop, total is initialized to the cube of 1.

Next, value of variable k is incremented by 1 so that k is initialized to next integer.

After first execution of the loop, k is incremented from 1 to 2.

while( k <= n )

{

total = total + ( k * k * k );

k = k + 1 ;

   }

When the value of k reaches the value of integer n, the cube of n is calculated and added to the variable, total.

When k is incremented, it becomes more than n and hence, loop gets terminated.

As the return type of main is int, the program terminates with the statement shown below.

return 0;

No output is displayed as it is not mentioned in the question.

No user input is taken as it is mentioned that integer variables are already initialized.

4 0
3 years ago
Using tracking code, google analytics can report on data from which systems?
soldier1979 [14.2K]
The correct answers are:
<span>E-commerce platformsMobile
Applications
Online point-of-sales systems
Source and explanation: https://goo.gl/guJKC9
</span>
6 0
4 years ago
How many fnaf games did Scott Cawthon make?
MrMuchimi

Answer:

8 but he is making FNaF security breach

Explanation:

there is FNaF VR help wanted

7 0
3 years ago
In one paragraph, explain how understanding social media influencing tactics has impacted the way you see social media posts in
Fofino [41]

Answer:

Social media influencing tactics has impacted the way I see social media posts in your daily life in the sense that if influences what posts I see and what posts I interact with.

Explanation:

Some examples of social media influencing tactics include ads, videos, social media influencers and so on.

When for example, and ad pops up on my social network and I click on it, similar ads of different products would appear later on my social network. In this way, my interaction with that ad has brought up similar ads to my attention. Likewise interaction with videos and social media influencers. When i interact with one video or social media influencer, a similar video or social media influencer is brought up to my attention in my feed.

4 0
3 years ago
What home ribbon group contains the command used for quickly converting selected cells to a table by choosing a table style?
Anni [7]
The answer would be Styles
6 0
4 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • What does OLE stand for? Object
    8·2 answers
  • Your network administrator finds a virus in the network software. Fortunately,
    13·1 answer
  • What list did poe appear on for the search engine lycos?
    11·1 answer
  • A technician has been notified of a problem on the network. After investigation, the technician determines that a specific inter
    7·1 answer
  • A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on use
    11·1 answer
  • The scientific process is most similar to what
    10·1 answer
  • 2. Used to drive in or remove screws that fasten electrical wires or other electrical accessories. A. Pliers C. Screwdrivers B.
    15·1 answer
  • An instruction for the computer. Many commands put together to
    5·1 answer
  • EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!