1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
3 years ago
12

During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those por

ts?
Computers and Technology
1 answer:
Setler [38]3 years ago
5 0

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

You might be interested in
Which of the following is a reason photographing animals can be difficult?
erma4kov [3.2K]
They always move, so its hard catching them still, and if they are in action, you can't get a good picture because it will come out blurry. Hope this helps. Let me know if you need anything else.
4 0
3 years ago
Read 2 more answers
Justify the need for branching and jump codes in the instruction set using real world scenarios
topjm [15]

Answer:

As in the real world, people using a program would provide different inputs, that would require different outputs. For example in a traffic light system, there could be a function that constantly checks for if the button is pressed. When the button is pressed the traffic light loop would branch out of its current running code in order to turn the lights to red, and allow the pedestrians to cross.

8 0
3 years ago
Name the different tools used byMMDB.
Anastaziya [24]

Answer:

MMDB stands for the multimedia database as, it the process of collection of the multimedia data or datatypes like images and graphical objects. It basically manages the several types of the data or information and control the multimedia databases.

Different types of tools are:

  •  Video and audio processing system
  •   Artificial intelligence
  •   Graphic design system
  •    Mobile and wireless computing

7 0
4 years ago
What is the term for a web site that uses encryption techniques to protect its data?
vesna_86 [32]
The answer is secure site, I hope it helps.
8 0
3 years ago
Which is the last step to creating a community garden
pentagon [3]

Answer:

construct the garden

Explanation:

step 1. survey the property

step 2. test the soil

step 3. clean contaminants

step 4. consider garden design

step 5. construct the garden

7 0
3 years ago
Other questions:
  • Why are open standards important in the data communications industry?
    5·1 answer
  • Cover photos have a prominent location in your social media profiles, so you should use this space strategically – for example,
    14·1 answer
  • . Write a recursive function names factorial to compute the factorial of the parameter. Also write the main function, where you
    15·1 answer
  • Why do most programmers indent the conditionally executed statements in a decision structure?
    7·1 answer
  • A data mart differs from a data warehouse in that: Group of answer choices it deals with a particular component or functional ar
    13·1 answer
  • What is UTF-8 and why was it created?
    8·1 answer
  • Write a short program that uses a for loop to write the numbers 1 through 10 to a file
    11·1 answer
  • 1) Discuss when it is best to use indexes. ​
    6·1 answer
  • Emotions can have Impact on your driving?
    10·1 answer
  • Which feature is used to help identify the appropriate content for particular form fields?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!