1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
11

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,

it does determine which systems are active on the network and what services they offer or what ports are available
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

You might be interested in
Write a function:
Elden [556K]

Answer:

what are the choices

:"

Explanation:

5 0
3 years ago
Why is contrast important when designing a web page
Phantasy [73]

Contrast is important when designing a web page for many reasons. One of the most important reasons is because if you don't have contrast, you won't be able to read what is written on the page. Your eyes will have to strain really hard or it just simply won't be possible to read at all. Another really important reason is that contrast makes the web page look visually appealing. Whereas, if you don't have contrast it is all kind of jumbled together. As you can see there is a plethora of reasons contrast is important.

I hope that helps u!!

:)

8 0
3 years ago
U
JulijaS [17]

Answer:

sgvxvb

Explanation:

cbcbcbcb

6 0
3 years ago
____ storage is not recommended for long-term archiving because the storage media can degrade over time
Lunna [17]

Hard Drive is not recommended for long-term archiving because the storage media can degrade over time,

<h3>What type of storage is recommended for long term data retention?</h3>

The long method used to long-term retention is the use of cloud. Cloud-based are known to be a form of cold storage that is made up of intelligent storage software.

Note that Hard Drive is not a long term kind of storage in the above context and as such, PE storage is not recommended for long-term archiving because the storage media can degrade over time,

Learn more about storage from

brainly.com/question/1317328

#SPJ1

5 0
3 years ago
What are the effects of computer piracy?
andrew11 [14]
Getting swatted and up to a $250k fine im pretyt sure
4 0
3 years ago
Other questions:
  • _____ is two or more connected computers.
    8·1 answer
  • A ____ is a structure that allows repeated execution of a block of statements.
    13·2 answers
  • Janet has to create a webpage for a software company that should be accessible from both desktop computers and mobile devices. W
    12·1 answer
  • Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whene
    9·1 answer
  • Spoken word and written word are different because what
    9·1 answer
  • Which of the following game markets especially benefits from using vector graphics?
    8·1 answer
  • What technology would you like to use or see developed that would help you be a "citizen of the world"?
    5·1 answer
  • Charlie makes pizza at a restaurant. The customers always compliment how great the pizza tastes. But Charlie takes a long time t
    7·2 answers
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • What techniques can be used to assess a product?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!