1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreyandreev [35.5K]
3 years ago
11

provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,

it does determine which systems are active on the network and what services they offer or what ports are available
Computers and Technology
1 answer:
Oxana [17]3 years ago
3 0

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

You might be interested in
How are information systems used at the industry level to achieve strategic advantage? By enforcing standards that reduce the di
kiruha [24]

Answer:

By building industry-wide, IT-supported consortia and symposia

Explanation:

Industry members can build industry-wide, IT-supported consortia, symposia, and communications networks to coordinate activities concerning government agencies, foreign competition, and competing industries.  By working with other firms, industry participants can use information technology to develop industry-wide standards for exchanging information or business transactions electronically, which force all market participants to subscribe to similar standards. Such efforts increase efficiency at the industry level as well as at the business level, making product substitution less likely and perhaps raising entry costs, thus discouraging new entrants

8 0
4 years ago
Which statement about trees is false?
anzhelika [568]

Answer:

The correct answer is A.

Explanation:

B is true if the two nodes are descending from the same parent node, they are called sibling nodes.

C is true, the nodes which do not have any nodes branching from them are called leaf nodes and mark the end of that specific branch.

D is true, a node tree is defined as nonlinear set of nodes growing downwards which are linked together.

The false option is A, a node in a node tree does not have to contain at least two links, it can be a leaf node.

I hope this answer helps.

6 0
4 years ago
How does one select an entrepreneurial activity?
dem82 [27]
<span>Entrepreneurial activity is a human action with the goal of the generation of value, through the creation or expansion of economic activity. Several things must be taken into consideration before starting an </span><span>entrepreneurial activity but the most important is :
- the benefits it will give (financial but also personal , will you be satisfied doing that activity and will the activity bring financial benefits to you?
If yes, then you can do this activity.
</span>
6 0
4 years ago
The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
Trava [24]

Answer:

Pattern.

Explanation:

The pattern attribute can be used only with input boxes that store text.

Generally, the pattern attribute cannot be used with other types of data in computer programming.

Basically, it comprises of data types which mainly includes an attribute of the text, e-mail, telephone, uniform resource locator (URL), search input types and password which must all be matched with the input value in order to pass an authentication or authorization.

3 0
3 years ago
Complete the printtictactoe function with char parameters horizchar and vertchar that prints a tic-tac-toe board with the charac
lora16 [44]
Void printtictactoe(char horizchar, char vertchar)
{
int i,j;
int scale = 5;

for(j=0; j<3; j++) {
   for (i = 0; i < scale; i++)
      printf("%*c%*c\n", scale+1, vertchar, scale+1, vertchar);
      if (j < 2) 
         for (i = 0; i < (scale * 3)+2; i++)
             printf("%c", horizchar);
             printf("\n");
    }
}

I left out many braces because of the layout issues with this website. There is a scale factor you can set to the desired size of the board cells!
3 0
3 years ago
Other questions:
  • References are usally innocuous because they are the least personal and direct of the four reference types
    5·1 answer
  • Add a throw statement to the processNumbers function that throws the message "All elements in the list should be numbers." if on
    12·1 answer
  • Pls help is very urgent and I will mark u as brainliest plsssss​
    11·2 answers
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • 8. Cloud Storage is
    5·2 answers
  • Write a paragraph discussing privacy issues on the internet<br> and their impact on human lives.
    9·1 answer
  • Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
    9·1 answer
  • a) In an office, it is required to take hundreds of copies of the same type written document. Which traditional method of docume
    11·1 answer
  • Select the correct answer.
    11·2 answers
  • Your program has a loop. You want to exit the loop completely if the user guesses the correct word.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!