1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
6

Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has download

ed every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Bob is unable to get any useful results. Why is Bob having these problems?
Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
3 0

Incomplete question. The full question read;

Why is Jim having these problems?

Options:

A. Security scanners are not designed to do testing through a firewall.

B. Security scanners cannot perform vulnerability linkage.

C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.

D. All of the above.

Answer:

<u>D. All of the above.</u>

Explanation:

<em>Remember, </em><u>security scanners</u> are only designed to <em>gather</em> information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.

Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.

You might be interested in
After execution of the following code, what will be the value of input_value if the value 0 is entered at the keyboard at run ti
katen-ka-za [31]
Cin >> input_value;
if (input_value > 5)
input_value = input_value + 5;
else if (input_value > 2)
input_value = input_value + 10;
else
input_value = input_value + 15;

The right answer is : 15
7 0
4 years ago
What types of company functions are aided by ERP?
Jet001 [13]

Answer:

These activities include <u>accounting, project management, attendance management, managing merchant details, attendance management, compliance and employee management.</u>

7 0
2 years ago
Binary divide 1101011 by 111​
denis-greek [22]

is this computer subject

5 0
3 years ago
Read 2 more answers
What is better for the sd card use as portable storage or use as internal storage?
Sever21 [200]
It depends on what you’d need it for.

> Portable Storage <
- Good for traveling.
- Good for porting stuff from a device to another device.

> Internal Storage <
- Better if you are using it for one device.
- Increase device storage.
5 0
3 years ago
A _____ saves your query and formats it in a professional-looking way.
Andrei [34K]

B. Report (APEX VERIFIED)

8 0
4 years ago
Read 2 more answers
Other questions:
  • The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
    7·1 answer
  • Which of the following statements is true?
    12·1 answer
  • What is computer Network?​
    14·2 answers
  • Some careers emerge to address the environmental impact human behaviors and processes might be having on our planet. True False
    9·2 answers
  • A banded table appears with
    14·1 answer
  • To complete this assignment you will:
    9·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • Primitives of transport service assume asymmetry between the two end points during connection establishment, one end (server) ex
    8·1 answer
  • The options are file protection , fault-tolerance , fault line , file tolerance , and the question is which term describes the d
    6·1 answer
  • Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the steps you wo
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!