1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
11

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,

it does determine which systems are active on the network and what services they offer or what ports are available
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

You might be interested in
Which of the following is one of the options available on the Columns menu on the
Norma-Jean [14]

Answer:

d)all of the above

Explanation:

The options available on the column menu on the layout tab are one, two, three left and right. Hence, all of the above options are the options available on the column menu on the layout tab. You can check this by going inside the layout tab, and clicking on the column option. Once you will do this, you will see all of the above-mentioned options showing there. Hence, d. all of the above is the correct choice for this question.

6 0
3 years ago
WILL UPVOTE NEED ANSWERS ASAP i have till 4:30
deff fn [24]
B. Summer monsoons bring heavy rainfall and winter monsoons create dry and arid conditions.
6 0
4 years ago
The ____ is the point in the past to which the recovered applications and data at the alternate infrastructure will be restored.
Genrish500 [490]

Answer:

Backup copy

Explanation:

system restore point is called a backup or backup copy of the system, this point keeps the inicial setting or configuration on the software, we usually use this tool when we're having some issues with the software, usually during the installation process  of a new software, letting us to save the data and off course with this point created the user could revert the issues or fix the problems occuring in the configuration.

5 0
4 years ago
Which code returns the date in the format friday, april 20th, 2015?
Vera_Pavlovna [14]
<span>The answer is : DATE_FORMAT('2012-04-20', '%W, %M %D, %Y')
This is the </span><span>code that returns the date in the format friday, april 20th, 2015?</span>
6 0
3 years ago
In which type of market do farmers sell their produce directly to village traders in rural areas?
Anna007 [38]

Answer:

Local Market or Primary Market.

Explanation:

The farmers sell their products to big traders in the bigger market in the urban areas. However, they also sell a part of their products to various village traders, who are located in the rural areas and can be found in local or primary markets. It's not so that they are not useful as well, as small farmers, in fact, sell the whole of their produce in the local or primary market as we know them by name. And the farmer gets a reasonable return there as well.

8 0
4 years ago
Other questions:
  • Write a program to input money in cents from user, example 12745 and display the one dollar bills and the cents. Submit source c
    12·1 answer
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • Which information is necessary to determine an object's speed?
    13·1 answer
  • • Suppose Host A wants to send a large file to Host B. The path from Host A to Host B has three links, of rates R1= 500 kbps, R2
    15·1 answer
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • Heidi uses her computer to write articles for a newspaper. She uses a program to listen to the articles before she submits them
    5·1 answer
  • Create a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The loop shou
    5·1 answer
  • what would be the address of the cell, which is intersect of the second row and third column in a worksheet
    8·2 answers
  • What is the largest place value in a 12 bit binary number?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!