Answer:
The code is below. The output is "Eric went to Chipotle to buy 12 different types of Cars"
Explanation:
import java.util.scanner;
public class labprogram {
public static void main (string [ ] args) {
scanner scnr = new scanner (system.in) ;
string firstname;
string genericlocation;
int wholenumber;
string pluralNoun;
firstName = scnr.next();
genericLocation = scnr.next();
wholeNumner = scnr.nextInt();
pluralNoun = scnr.nextLine();
system.output.println(firstname + " went to " + genericlocation + " to buy " + wholenumber + " different types of " + pluralnoun + " . ");
}
}
Answer: Passive
Explanation: Passive scanning is the process that scans the possibility of the risk that can arise while data is received starting port to the destination. It does the scanning between the server and the client software to define vulnerability .
It cannot work in those network which don't persist the traffic.No false data that is present in the application is detected by it if the data is unclear.
Answer:
b. Customized auditing.
Explanation:
Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.
There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.
The credentialed scanning provides baseline and customised auditing features.
Answer:
ipconfig
Explanation:
ipconfig (short for <em>internet protocol configuration</em>) is a command line tool used for determining the network connection configuration of a computer. Some of these configuration information are;
i. the IP address of the computer
ii. default gateway address
iii. subnet mask
iv. Media Access Control (MAC) address.
Answer:
Explanation:
web server= stores text, images, and other media that make up a website
email server= stores and exchanges messages
Proxy server= filters content and stores data for faster access
FTP server= stores and provides files for download