1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
2 years ago
8

Match each item with a statement below. - A popular port scanners that has the ability to use a GUI front end - Allows you to pi

ng multiple IP addresses simultaneously and is usually included in Kali Linux - Tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets - The original utility from which OpenVas was developed - A port state which does not allow entry or access to a service - An open-source fork of Nessus - A port state that may indicate a firewall is being used to allow specified traffic into or out of the network - A port state that allows access to applications and can be vulnerable - Allows you the ability to scan thousands or even tens of thousands of IP addresses quickly - Performed by port scanners to scan large networks to identify which IP addresses belong to active hosts
Computers and Technology
1 answer:
Nina [5.8K]2 years ago
5 0

Answer:

1. Nmap.

2. Fping.

3. Hping.

4. Nessus.

5. Closed port.

6. OpenVAS.

7. Filtered port.

8. Open port.

9. Port scanning.

10. Ping sweep.

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are;

1. Local (internal) IP address.

2. Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are;

I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.

II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

1. Nmap: a popular port scanners that has the ability to use a graphical user interface (GUI) front end.

2. Fping: allows you to ping multiple internet protocol (IP) addresses simultaneously and is usually included in Kali Linux.

3. Hping: tool for performing ping sweeps and used to bypass filtering devices by injecting crafted or otherwise modified IP-packets.

4. Nessus: the original utility from which OpenVas was developed.

5. Closed port: a port state which does not allow entry or access to a service.

6. OpenVAS: an open-source fork of Nessus.

7. Filtered port: a port state that may indicate a firewall is being used to allow specified traffic into or out of the network.

8. Open port: a port state that allows access to applications and can be vulnerable.

9. Port scanning: allows you the ability to scan thousands or even tens of thousands of internet protocol (IP) addresses quickly.

10. Ping sweep: performed by port scanners to scan large networks to identify which internet protocol (IP) addresses belong to active hosts.

You might be interested in
Maia notices that her paragraphs are too close to one another. She wants to increase the space. Which arrangement of steps does
kirza4 [7]

Maia can quickly and easily adjust the spacing that exists before and after her paragraphs. To achieve this, she should select her paragraphs and click the Line and Spacing command in the Paragraph command group. She should be able to click the Add Space Before Paragraph from the drop-down menu. The paragraph spacing should change. In the same drop-down menu, she can also select the Line Spacing Option. This will open the Paragraph dialog box. This option will let her control how much space She wants before and after the paragraph. These two options are placed and indicated down below the Paragraph dialog box.

7 0
3 years ago
Read 2 more answers
After adding an image to her flyer, Danica played around to see which layout would look the best. At one point, her text was on
Norma-Jean [14]

Answer:

Position Feature

Wrap text feature

Picture tools

Explanation:

3 0
3 years ago
Read 2 more answers
When Kim was working in her Microsoft® Excel® spreadsheet, she accidentally placed her book on the spacebar and erased the conte
zaharov [31]

Answer:

The undo tool.

Explanation:

Microsoft Excel is a spreadsheet application developed by Microsoft, it is used for analysing data. It's worksheets are made up of columns and rows or fields and records.

There are different ways of entering data to a cell. Click on the cell and type the data, copy and paste to the target cell, double-click on the cell to correct data and click on a cell and press the spacebar key to clear the data.

Excel records the action of event, so when a mistake is made like deleting a crucial cell data value, the undo tool is used to recover the data, since it holds records of events. The redo tool is the reverse of the undo tool.

5 0
3 years ago
A(n) ____ is a computer that requests and uses network resources from a(n) ____.
Crazy boy [7]

A(n) client exists a computer that requests and utilizes network resources from a(n) server.

<h3>What is a computer network?</h3>
  • A computer network is a collection of computers that share resources that are available on or provided by network nodes.
  • The computers communicate with one another via digital links using standard communication protocols.
  • These links are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a variety of network topologies.
  • Nodes in a computer network can be personal computers, servers, networking equipment, or other specialized or general-purpose hosts.
  • They can be identified by network addresses and have hostnames.
  • Local-area networks (LANs) and wide-area networks (WANs) are the two basic network types.
  • A(n) client exists a computer that requests and utilizes network resources from a(n) server.

To learn more about computer network, refer to:

brainly.com/question/8118353

#SPJ4

6 0
1 year ago
A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
Rama09 [41]

Answer:

C. CMR systems

Explanation:

CMR or customer relationship management is a strategy that uses data analysis of customers to manage the interaction between a company and current and potential customers.

It analyses the data of client from different channels like wesites, email, social media,telephone log etc, describing and predicting potential decisions to be made to enhance customer service and acquisition.

6 0
3 years ago
Other questions:
  • 9. What is the difference between a hand-drawn sketch, a working drawing, and a 3D model?
    14·1 answer
  • 6. The NADH and FADH2 produced during the Krebs cycle pass their electrons down the 7. __ __ __ __ __ __ __ __ __ __ __ __ __ __
    6·1 answer
  • How does Technology impact any profession or occupation?
    5·1 answer
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • Drag the correct type of update to its definition.
    14·1 answer
  • Which of the following is NOT a useful strategy when making an informed purchase ?
    7·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • ; This program replaces the value in R0 with its absolute value. ; ; It does NOT modify any other registers! ; .ORIG x0200 START
    6·1 answer
  • You have instructed all administrators to disable all nonessential ports on servers at their sites. why are nonessential protoco
    7·1 answer
  • question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!