1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
2 years ago
8

Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi

ng multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Computers and Technology
1 answer:
Nina [5.8K]2 years ago
5 0

Answer:

1. Nmap.

2. Fping.

3. Hping.

4. Nessus.

5. Closed port.

6. OpenVAS.

7. Filtered port.

8. Open port.

9. Port scanning.

10. Ping sweep.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.

2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.

3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.

4. Nessus: the original utility from which OpenVas was developed.

5. Closed port: a port state which does not allow entry or access to a service.

6. OpenVAS: an open-source fork of Nessus.

7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.

8. Open port: a port state that allows access to applications and can be vulnerable.

9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.

10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.

You might be interested in
Type the correct answer in the box. Spell all words correctly. Complete the sentence based on the role education plays to help y
CaHeK987 [17]

Answer:

what do i do??

Explanation:

8 0
3 years ago
you are installing two new hard drives into your network attached storage device your director asks that they be put into a raid
Genrish500 [490]

Question options:

a. RAID 0

b. RAID 1

c. RAID 5

d. RAID 6

e. RAID 10

Answer:

d. RAID 6

Explanation:

RAID is Redundant Array of Inexpensive/Independent Disks. RAID combines low cost physical hard disk drives in one hard disk drive. RAID is used to achieve data redundancy(data backup but with synchronization) or improved performance or both.

To get what the director requires he would need to use RAID 6. RAID 6 is RAID level optimized to achieve data redundancy but with slow performance.

7 0
2 years ago
Glenda operates an Airbnb business in which she rents an apartment for $150US per night . There is a mandatory deposit of 50 dol
Kipish [7]

Answer:

Steps of the technological design process include: identify a problem, research the problem, generate possible solutions, select the best solution, create a model, test the model, refine and retest the model as needed, and communicate the final solution.

Explanation:

3 0
2 years ago
What game is the best for racing and modifying cars
sleet_krkn [62]

Answer:  it is Forza Horizon 4. ...

Best Car Games

1.Forza Horizon 4

2. Grand Theft Auto V

3. Need For Speed Payback

4. Car Mechanic Simulator

5. Forza Horizon 4

6. Rocket League

Explanation:

6 0
2 years ago
The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​
alexandr402 [8]

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

4 0
2 years ago
Other questions:
  • You plan to use the Fill Down feature on a formula in Excel and need to keep a cell reference the same. Which format allows you
    6·1 answer
  • Write a program that prints the following text: In C, lowercase letters are significant. main() is where program execution begin
    14·1 answer
  • Enter the cube's edge: 4<br> The surface area is 96 square units.<br> Python
    12·1 answer
  • Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
    8·2 answers
  • Tools enable people to connect and exchange ideas
    7·2 answers
  • Wired network are the most reliable and provide the highest speed?
    7·1 answer
  • To protect a computer, it is a good idea to install and frequently run
    6·2 answers
  • Digital signatures are as legally acceptable as written signatures.
    12·1 answer
  • Which of the following number is divisible by 3? (340 , 432 , 113)​
    7·1 answer
  • What is a limitation of 5G mmWave, despite its high speed?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!