1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
11

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,

it does determine which systems are active on the network and what services they offer or what ports are available
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

You might be interested in
1What kind of rules protect everyone’s rights when we use each other’s content
Tanya [424]

Answer:

1. Copyright.

2. Songs and books.

Explanation:

A copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

For example, when an individual downloads a song owned by any record company without paying a purchase fee, it is a violation of copyright law.

A copyright can be defined as an exclusive legal right granted to the owner of a creative work (intellectual property) to perform, print, record, and publish his or her work. Also, the owner is granted the sole right to authorize any other person to use the creative work.

Hence, copyright is a kind of rules that protect everyone’s rights when we use each other’s content.

An intellectual property can be defined as an intangible creation of the human mind, ideas, thoughts or intelligence. Some examples of an intellectual property are songs, books, poems, technology, design etc.

3 0
3 years ago
4. The NIMS Management Characteristic of Chain of Command and Unity of Command means that each person: A. Continues to report di
Kipish [7]

Answer:

The answer is "Option C"

Explanation:

This system facilitates the establishment by state, Municipality, Militaristic, Provincial and local governments of a detailed, national framework for disaster response. This command structure of each person refers to only a single ICS boss because of NIMS management, and the wrong option can be defined as follows:

  • In option A, The Continuous report describes your daily details.
  • In option B, These reports are not in one ICS supervisor.
  • In option D, It can not assign different competences.
8 0
3 years ago
1. ¿Qué es un cursograma?
erma4kov [3.2K]

Answer:

Un cursograma permite representar gráficamente procedimientos administrativos. Constituyen instrumentos importantes para la visualización global y esquemática del conjunto de tareas administrativas.

6 0
2 years ago
Read 2 more answers
what would be the result of running these two lines of code
MatroZZZ [7]

Answer:

Jog

Explanation:

The variable options is a list containing 5 string values

options = ["ski", "surf", "jog", "bike", "hike"]

Indexing in python starts from 0 ; hence the index values of the list values are :

0 - ski

1 - surf

2 - jog

3 - bike

4 - hike

The statement ;

print(options[2]) means print the string at index 2 in the list named options

The string at index 2 is jog ;

Hence, the string jog is printed.

8 0
3 years ago
Matlab In this assignment you will write a function that will calculate parallel resistance for up to 10 parallel resistors. Cal
Ket [755]

Answer:

The complete Matlab code along with step by step explanation is provided below.

Matlab Code:

function Req=ParallelR(Number)

Number=input('Please enter the number of resistors: ');

if Number>10 | Number<=0

   disp('Invalid input')

return

end

R=0;

for i=1:Number

r=input('Please enter the value of resistor: ');

R=R+1/r;

end

Req=1/R;

end

Explanation:

Parallel resistance is given by

\frac{1}{Req} = \frac{1}{R_{1}} + \frac{1}{R_{2}} + \frac{1}{R_{3}}...+\frac{1}{R_{N}}

First we get the input from the user for how many parallel resistors he want to calculate the resistance.

Then we check whether the user has entered correct number of resistors or not that is from 1 to 10 inclusive.

Then we run a for loop to get the resistance values of individual resistors.

Then we calculated the parallel resistance and keep on adding the resistance for N number of resistors.

Output:

Test 1:

Please enter the number of resistors: 3

Please enter the value of resistor: 10

Please enter the value of resistor: 20

Please enter the value of resistor: 30

ans =       60/11

Test 2:

Please enter the number of resistors: 11

Invalid input

Test 3:

Please enter the number of resistors: 0

Invalid input

8 0
2 years ago
Other questions:
  • Which of these is outside the scope of an art director's responsibility?
    12·2 answers
  • What is a critique of the feature detector model of object recognition?​?
    8·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    6·1 answer
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • Give 5 uses of software and hardware.
    15·1 answer
  • When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. you collect a capture fro
    12·1 answer
  • Which resource helps a user access a cloud service?
    8·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
    14·1 answer
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!