1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
11

Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d

ocument which ports are being listened on for the various servers. Which type of tool will the penetration tester most likely use
Computers and Technology
1 answer:
yulyashka [42]3 years ago
5 0

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

You might be interested in
Which text features does this section contain? Check all that apply.
NISA [10]

which ones apply manuelh


6 0
3 years ago
Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commissio
IrinaK [193]

Answer:

srry dont know

Explanation:

8 0
3 years ago
What privacy risks do new technologies present,<br> and how do we decide if they're worth it?
vredina [299]

Answer:

Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas

Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?

Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…

En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..

Explanation:

6 0
3 years ago
Who is the first computer programmer​
enot [183]

Answer:

Ada Lovelace was the first computer programmer

8 0
2 years ago
Read 2 more answers
A mother age is formed by reversing the two digits of daughters age. If the mother is 18 years older than daughter and sum of th
Gwar [14]
I'm not absolutely positive that my answer is correct... but here's what I got...

Mother: 33 years old

Daughter: 15 years old
4 0
3 years ago
Other questions:
  • Consider a relation representing the present position of molecules in a closed container. The attributes are the ID for the mole
    12·1 answer
  • At the moment i am tackling the cs50x projects and i need a little bit of help with problem set 1, the 'greedy algorithm'. I am
    5·1 answer
  • Access Office Equipment has shifted to sales and service of laptops and PCs, where it has the potential to triple the number of
    15·1 answer
  • Student creates a Raptor program and uses the File Input and Output method to find the average of 5 test scores stored in a text
    5·1 answer
  • What are two reasons why tuples exist in Python?
    9·1 answer
  • Creating Classes
    10·1 answer
  • What is a thoughtware​
    7·1 answer
  • What are node in a computer network​
    14·1 answer
  • Python Coding:
    15·1 answer
  • What is e banking effects
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!