1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
11

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,

it does determine which systems are active on the network and what services they offer or what ports are available
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

You might be interested in
In a study on software license infringement, those from United States were significantly more permissive than those from the Net
daser333 [38]

Answer:

The answer is "False"

Explanation:

In the given statement some information is missing, that is options "true or false", which can be described as follows:

The software suite breach has become a lawful effort, that arises as just a consequence of piracy, in which the court charges resulting as a condition of piracy is the patent license violation charge. Its use, replication or sharing of proprietary technology is not allowed as online piracy.

  • It enables firms to provide their operating systems more effectively.  
  • In this the US was rather more strict, than the Netherlands and other countries, that's why the given statement is false.
8 0
2 years ago
The final step in the object-oriented design (ood) process consists of developing the?
kenny6666 [7]

The final step in the object-oriented design (OOD) process consists of developing the <u>package diagrams.</u>

<u></u>

In the field of Computer studies, object-oriented design (OOD) can be described as a design method in which a proper system of interacting objects is planned for making a computing system or software.

The final step of an object-oriented design (OOD) involves the development of package diagrams. Package diagrams are structures or diagrams that are used for representing the model elements. The model elements are shown as packages in this kind of diagram.

Package diagrams are the final step of an object-oriented design process because they help to provide a visual idea of the overall proposed design.

To learn more about object-oriented designs, click here:

brainly.com/question/13383471

#SPJ4

5 0
1 year ago
python This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defi
riadik2000 [5.3K]

Answer:

Check the explanation

Explanation:

arrow_base_height = int(input('Enter arrow base height:\n'))

arrow_base_width = int(input('Enter arrow base width:\n'))

arrow_head_width = arrow_base_width

while arrow_head_width <= arrow_base_width:

   arrow_head_width = int(input('Enter arrow head width:\n'))

print()

for i in range(arrow_base_height):

   for j in range(arrow_base_width):

       print('*', end='')

   print()

for i in range(arrow_head_width):

   for j in range(arrow_head_width-i):

       print('*', end='')

   print()

Kindly check the code output below.

5 0
3 years ago
Read 2 more answers
Would you rather be rich and unknown or famous and poor
ollegr [7]

Answer:

rich g

Explanation:

5 0
2 years ago
One reason to buy a home instead of rent a home is:
vazorg [7]
A is the correct Answer

7 0
3 years ago
Other questions:
  • It is difficult to use screening questions in computer-assisted surveys. <br> a. True <br> b. False
    8·1 answer
  • Write a Python function merge_dict that takes two dictionaries(d1, d2) as parameters, and returns a modified dictionary(d1) cons
    5·1 answer
  • What short (two letters!) but powerful boolean operator can check whether or not one string can be found in another string?
    12·1 answer
  • A method that receives a two-dimensional array uses two ____ pairs following the data type in the parameter list of the method h
    11·1 answer
  • Why does brainly keep saying “oops... something went wrong! Try again”
    7·2 answers
  • You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You ch
    13·1 answer
  • is there anybody out there who is a social butterfly like me? If so then you can tlk to me on this. and to anybody out there tha
    12·1 answer
  • Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers Thi
    6·1 answer
  • There are many reasons to convert to the decimal numbering system. Select the best answer. When checking numeric values in compu
    5·2 answers
  • What is the function of tab?<br>​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!