1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
2 years ago
8

Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi

ng multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Computers and Technology
1 answer:
Nina [5.8K]2 years ago
5 0

Answer:

1. Nmap.

2. Fping.

3. Hping.

4. Nessus.

5. Closed port.

6. OpenVAS.

7. Filtered port.

8. Open port.

9. Port scanning.

10. Ping sweep.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.

2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.

3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.

4. Nessus: the original utility from which OpenVas was developed.

5. Closed port: a port state which does not allow entry or access to a service.

6. OpenVAS: an open-source fork of Nessus.

7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.

8. Open port: a port state that allows access to applications and can be vulnerable.

9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.

10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.

You might be interested in
What do you mean by Information Technology explain​
Elena-2011 [213]

Answer:

False

Explanation:

Chloroplasts = photosynthesis

mitochondria= cellular respiration

5 0
2 years ago
Read 2 more answers
A diet to contain at least 2400 units of vitamins, 1800 units of minerals, and 1200 calories two foods , Food A and Food B are t
Firdavs [7]

Answer:

30 units of Food A and 45 units of Food B are to be purchased to keep costs at the minimum $105.

Explanation:

X = Amount of food A

Y = Amount of food B

Z= 2X+Y..... minimum cost equation

50X + 20Y > 2400 .................Vitamins .......(1)

30X + 20Y > 1800 ...................Minerals.......(2)

10X + 40Y > 1200 .................Calories ..........(3)

X  > 0

y  > 0

X=30  and Y = 45

Z= 2(30) + 45 = $105

8 0
2 years ago
Can you share a google Docx. with a person who has an Icloud Email?
stiks02 [169]

Answer:

Yes, all you do is click 'share' on the top right and then copy the link, then you would send the link to said to person that has a icloud email.

5 0
3 years ago
A queue processes elements in a _____ manner. <br> a. filo <br> b. lifo <br> c. lilo <br> d. fifo
sladkih [1.3K]

A queue processes elements in a <u> fifo</u> manner.

<h3>What is the rule that each stack and queue are understood by?</h3>

The rule used for a queue is to permanently remove the item that has been in the collection the most amount of time.

This policy is known as first-in-first-out or FIFO. The rule used for a stack is to always remove the item that has been in the collection the least amount of time.

<h3>What is queue how it is distinct from stack and how is it implemented?</h3>

The primary difference between Stack and Queue Data Structures is that Stack pursues LIFO while Queue follows FIFO data structure type. LIFO guides to Last In First Out. It means that when we put data in a Pile, it processes the last entry first. Conversely, FIFO guides to First In First Out

To learn more about FIFO,  refer

brainly.com/question/27952133

#SPJ4

3 0
1 year ago
Ways by which you can improve your typing speed
grandymaker [24]

1. Keep the size of the keys in mind. The larger they are, the easier it will be to type. That means you may want to look for a keyboard where the keys that you use most often, such as the letters and numbers, are larger than other keys.

2. A keyboard with concave keys that fit the shape of your fingers is a good option if you're looking to eliminate errors in your typing as you try to increase your speed.

3. It's best to choose a keyboard with keys that have strong tactile feedback, which means they offer enough resistance to alert you that the stroke has registered. The resistance also keeps you from accidentally hitting keys as you're typing, so you can type more quickly.

4. When you arrange your fingers on the keyboard, curve them slightly, but keep your hands relaxed.

Make sure that your keyboard is centered directly in front of your body.

5. certain fingers are designated to strike certain keys for the most efficient typing. In most cases, you’ll use the same fingers from the home row to hit the keys that line up in the rows above and below.

Strike the “1,” “2,” “Q,” and “Z” keys, in addition to the “A” key, with your left pinky.

Strike the “3,” “W”, and “X” keys, in addition to the “S” key, with your left ring finger.

Strike the “4,” “E”, and “C” keys, in addition to the “D” key, with your left middle finger.

Strike the “5,” “6,” “R,” “T,” “G,” “V,” and “B” keys, in addition to the “F” key, with your left index finger.

Strike the “7,” “Y,” “U,” “H,” “N,” and “M” keys, in addition to the “J” key, with your right index finger.

Strike the “8,” “I,” and “,” keys, in addition to the “K” with your right middle finger.

Strike the “9,” “O,” and “.” keys, in addition to the “L” key, with your right ring finger.

Strike the “0,” “-,” “=,” “P,” “[,” “],” “‘,” and “/” keys, in addition to the “;” key, with your right pinky.

Hit the “Shift” key with the pinky on the opposite hand from the finger that you’re using to strike the other key.

Hit the spacebar with whichever thumb feels most comfortable to you.

Practice regularly.

These are some effective ways to improve typing speed.


Please rate if it helped! Thanks :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following types of access controls do not describe a lock? (a)- Directive (b)- Physical (c)- Preventative (d)- Dete
    8·1 answer
  • ________ enables advertisers to display more relevant ads based on user's search and browsing history. FIP NORA A Web bug An int
    10·1 answer
  • How can i complain a rude comment
    7·1 answer
  • Ng/ Computer Applications - Office 2016 - EL3520 A
    13·1 answer
  • Label 14 parts of the inside of a computer
    6·1 answer
  • Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for com
    15·1 answer
  • A manager would like information on the knowledge base searches conducted by customers and call center agents. Which two metrics
    10·1 answer
  • You interact with a program through which of the following, thereby controlling how you enter data and instructions and how info
    5·2 answers
  • Which of the following is not true?A. An organization may express its cybersecurity state through a Current Profile to report re
    10·1 answer
  • [If you were the queen of the world .... What would you change ?]
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!