1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
11

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,

it does determine which systems are active on the network and what services they offer or what ports are available
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

You might be interested in
What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
irakobra [83]

The command is Export-NpsConfiguration    

An admin can export the entire NPS configuration from one NPS for import to another NPS. Standard precautions should be taken when exporting NPS configurations over the network. The command syntax that can be used for exporting the NPS configurations is Export-NpsConfiguration –Path <filename>


3 0
3 years ago
)In a vector implementation of a stack ADT, you add an entry to the top of a stack using which vector method?
kotykmax [81]

Answer:

B.add.

Explanation:

boolean add(element)

The add method in java inserts an element in the vector.It's return type is Boolean it returns true if the element is successfully inserted in the vector and false if the operation is unsuccessful.There is no Push operation in vector.Hence we conclude that the answer is add.

8 0
3 years ago
A server is a special kind of computer that manages access to resources such as files, applications, peripherals, emails, and we
Basile [38]

Answer:

true

Explanation:

6 0
3 years ago
Read 2 more answers
.Suppose some functions have been entered into a local file named "weather.js". Write the correct SCRIPT tag to load the library
Doss [256]

Answer:

<script type="text/javascript" src="weather.js"></script>

Explanation:

we have to use above script tag to include weather.js file into our web page.

Here type attribute represents the type of the file which we are trying to include on the web page.src attribute represents the path of the file from where we want to include that into our web page.

Generally we can include our java script functions into web page in 2 ways. one is inline function we can write the code in web page <script> tag itself .another way is to write the code in a separate file as shown above and include it in the webpage

5 0
3 years ago
In Revit, BIM provides a variety of model information. Which piece of information is not offered by BIM? Select Answer A) Payrol
gizmo_the_mogwai [7]

Answer:

yeet my points into my wallet i need brainliest for points plzz

i actually think scheduling im 11 so i dont know dude

4 0
3 years ago
Other questions:
  • Easy question how the internet has impacted y’all life
    13·1 answer
  • The mean life of a certain computer hard disk in continual use is 8 years. (a) How long a warranty should be offered if the vend
    14·1 answer
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • Containers for contaminated sharps must have several characteristics. What’s missing from the list? PuContainers for contaminate
    5·2 answers
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • What is the name for a hardcoded value entered into a formula ?
    8·2 answers
  • Describe the procedure for creating a table or spreadsheet in a presentation slide.
    13·1 answer
  • True or False The two types of general construction projects are residential for homes or dwellings and commercial for a commerc
    7·1 answer
  • 300134223+304532264440=
    11·2 answers
  • Most effective way of closing email is<br>​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!