1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
5

Neil notices that a single address is generating traffic from its port 500 to port 500 of several other machines on the network.

This scan is eating up most of the network bandwidth and Neil is concerned. As a security professional, what would you infer from this scan
Computers and Technology
1 answer:
AURORKA [14]3 years ago
8 0

Answer:

It means that the attacker want to determine the type of VPN Implementation and checking for IPSec

Explanation:

VPN means Virtual Private Network and is deployed to share infrastructure with the same access or security policies as a private network among multiple sites.

You might be interested in
Part B
frosja888 [35]
Computer programming 2254518752669
8 0
3 years ago
Victoria is creating a brochure for her photography studio. She designed the layout and placed a photo in the center of the page
cestrela7 [59]

Assuming Victoria is using Adobe Photoshop to create her brochure, below are the steps she is required to follow.

She should first open the image on Photoshop, click on the image option and select duplicate just in case the resized image is not what she wants.

Still on the image option, she should select Image size. A screen will pop up at this point, indicating the image’s current size. For the purposes of image resizing, Victoria should select Pixel dimensions category.

She should be able to type her preferred dimensions for both the width and height. She should make sure ‘Constrain Proportions’ is unchecked to be able to type in separate values.

If she decides to use the photo editing program, she can simply click on the image, and if resize handles appear around it, she can click and drag those to the desired size.


3 0
4 years ago
These factors limit the ability to attach files to e-mail messages. location of sender recipient's ability to open file size of
NeX [460]

The answer is

Recipient's ability to open file

Size of file

Sometimes, it might occur that the email message attachment you’ve sent to someone has an error or is corrupt and thus, limits the recipient ability to open the file. Another factor is the size of the file. All email servers limit the size of the file attached in an email that a recipient can receive mainly because of security reasons. Google Mail, for instance, only allows you to send 25MB only. This might limit the ability to attach files to e-mail messages as well.

3 0
3 years ago
Read 2 more answers
Which technology will a business use to figure out who accessed confidential files on a company's computer system
Charra [1.4K]

Answer:

insaj cdsjl ljhwbalfhb

Explanation:

8 0
3 years ago
SRV02 holds a shared folder named Forecast for the managers group. Maria is a member of the managers group. You would like to gr
belka [17]

Answer:

You need to enter to the server restrictions panel (it depends on which server you are using). Just like you granted full permission to the other members in the managers group, you need to add Maria to the group, but restricting her access to read-only, so she would only be able to view the files without modifying or erasing them.

Explanation:

8 0
4 years ago
Other questions:
  • The ______________ steps through the source code, converting each source code instruction into appropriate machine language foll
    7·1 answer
  • List three uses of the INTERNET
    9·2 answers
  • Is cloud computing a hardware service used to keep computers working? True or False
    11·1 answer
  • Write a loop that reads positive integers from standard input, printing out those values that are greater than 100, and that ter
    14·1 answer
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·1 answer
  • Find the number of ideal integers within the given segment [low,high] inclusive. An ideal number is a positive integer that has
    9·1 answer
  • Select the correct statement(s) regarding CENTREX. a. CENTREX systems reside at the service providers central office, however, t
    11·1 answer
  • 16. Budget Analysis Write a program that asks the user to enter the amount that he or she has budgeted for a month. A loop shoul
    14·1 answer
  • MODERATOR DELETE MY ACC
    8·2 answers
  • What's the difference between an exe file and an msi file?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!