1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
4 years ago
7

You are scanning a network to ensure it is as secure as possible. You send a TCP probe packet to a host with a FIN flag and rece

ive a RST/ACK response. What does this mean?
Computers and Technology
1 answer:
AleksAgata [21]4 years ago
7 0

Answer:

Hello your question lacks the required options here are the options

A)This response means the port he is scanning is open.

B)The RST/ACK response means the port Fred is scanning is disabled.

C)This means the port he is scanning is half open.

D) This means that the port he is scanning on the host is closed

answer : This means that the port he is scanning on the host is closed ( D )

Explanation:

When you scan a network to ensure it is secure enough by sending a TCP probe to a host with a FIN flag and you receive a RST/ACK response it means that The port that is been scanned on the host is closed

A TCP scanning/probe involves sending a number of packets to each port that is scanned. when you Compare TCP scanning methods to other methods of scans, a TCP Connect scan is typically slow and methodical.

You might be interested in
Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
mojhsa [17]

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

8 0
3 years ago
Which are examples of copyrighted online materials? Check all that apply.
Stella [2.4K]
The answers are 1, 3, and 5.
7 0
3 years ago
Read 2 more answers
You just got a shipment of 10 network-attached laser printers. You want these printers to always have the same address but you w
love history [14]

Answer:

Configure Reservations

Explanation:

The reason you do this, is because you are getting a permanent IP address assignment.

Hope this helps!

6 0
3 years ago
Describe the steps involved in data mining or data analytics when viewed as a process of knowledge discovery.
Aleksandr [31]

Answer:

1. Data Cleaning

2. Data Integration

3. Data Selection

4. Data transformation

5. Data Mining

6. Pattern Evaluation

7. Knowledge presentation

Explanation:

The steps involved in data mining or data analytics when viewed as a process of knowledge discovery includes the following:

Step 1. Data cleaning: this involves the elimination of inconsistent data.

Step 2. Data integration: this involves the combination of data from multiple sources.

Step 3. Data selection: this is the step where significant data for task examination are gathered from the database.

Step 4. Data transformation: this the step in which the data are modified for mining by conducting the aggregate operation.

Step 5. Data mining: this step involves the extraction of data patterns through specific techniques.

Step 6. Pattern evaluation: this step involves the identification of patterns that depict knowledge based on measures.

Step 7. Knowledge presentation: this is the step in which visualization and knowledge representation methods are utilized to illustrate mined knowledge to users.

6 0
3 years ago
Risks for standing up for the one who is being bullied
Afina-wow [57]
You, in turn, might end up getting hurt or bullied.
3 0
3 years ago
Other questions:
  • When a dynamic array with a class for a base type is declared, which constructor is called?
    5·1 answer
  • What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
    11·1 answer
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • Dotted Decimal Notation was created to______________. Group of answer choices provide an alternative to IP addressing express ea
    12·1 answer
  • Which of these programmers creates the core game engine?
    5·2 answers
  • The purpose of a malfunction indicator lamp (MIL) is to:
    12·1 answer
  • A circuit breaker will do which of the following
    12·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
  • What type of block start a sequence?
    12·1 answer
  • Which tool can you use to display hardware utilization statistics that tell you about the operation of your computer?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!