1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
7

Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

Computers and Technology
1 answer:
Scrat [10]3 years ago
6 0

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

You might be interested in
What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x < 5); A. 10 B. 200 C.
dezoksy [38]

Answer:

Option B is the correct answer.

Explanation:

  • In the above code, the loop will execute only one time because the loop condition is false and it is the Do-While loop and the property of the Do-while loop is to execute on a single time if the loop condition is false.
  • Then the statement "x*=20;" will execute one and gives the result 200 for x variable because this statement means "x=x*20".
  • SO the 200 is the answer for the X variable which is described above and it is stated from option B. Hence it is the correct option while the other is not because--
  1. Option A states that the value is 10 but the value is 200.
  2. Option C states that this is an infinite loop but the loop is executed one time.
  3. Option D states that the loop will not be executed but the loop is executed one time
6 0
3 years ago
Read 2 more answers
Can someone please give me some ideas of hooks about negative affects about social media?​
Kruka [31]

I'm sure you have heard of social media, But have you heard it start's to get out of hands because kids get addicted?

1)Causes kids to be addicted

7 0
3 years ago
Read 2 more answers
Given:
777dan777 [17]

Answer:

Python Code:-

#creating a list  

current_members = [4, 6, 9]

#defining the variable  

#assigning the value

member_id = 9

#defining variable count

count = 0

#defining the variable and setting initial value to true

is_a_member = False

#for loop is used to iterate over the list  

for x in current_members:

  #if statement will check whether the element is found

  if x == member_id:

      #set the value to true if the value is matched  

      is_a_member = True

      #set the value to 1

      count = 1

#if count == 0

#set the value of is_a_member variable to false

if count == 0:

  is_a_member = False

#print the current value stored in is_a_member variable

print(is_a_member)

Explanation:

In the above python program, a list is created that is "current_members"  and some values are inserted. In the next line, a three-variable is defined that are member_id, count, and is_a_member.

  • In both variable member_id, count assigns some value. and in is_a_member variable assign a False value.
  • Using a for loop to iterate over the list.
  • Inside the loop, If the statement will check whether the element is found. Then set the value of is_a_member variable to True and count to 1.
  • Another if the statement is used which checks the value of the count variable. If the value of count is 0 then set the value of is_a_member to False.
  • print() function is used to display the current value of is_a_member variable.
6 0
4 years ago
Please help me asapppp!​
I am Lyosha [343]

Answer:

1.  Formula is A2 : A9 = COUNT( A2: A9 ) = 8

2. Formula is SUM( A2: A9 ) = 36

3. Formula is B2 : B9 = COUNT( B2: B9) = 8

4. Formula is  MAX( C2: C9) = 5

5. Formula is MIN( C4: C8) = 3

6. Formula is SUM( C5 - C6) = 0

7. Formula is AVERAGE( C2: C9) = 4

Explanation: Have a nice day!✌️

6 0
3 years ago
True or false: pinhole cameras can be outfitted with very accurate viewfinders
arsen [322]

Answer:

true

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • The term _____ refers to computers that are among the fastest of any in the world at the time of their introduction.
    6·1 answer
  • Output devices reproduce or display which of the following
    12·2 answers
  • What is the decrypted binary
    9·1 answer
  • AYYOOOO CAN YOU HELP A GIRL OUUTT???
    11·1 answer
  • What is the value of grade after this program is executed? Assume the score is 50. if score >= 90: grade = "A" elif score &gt
    5·2 answers
  • Write a function named parts that will take in as parameters the dimensions of the box (length, width, and height) and the radiu
    12·1 answer
  • Use port in a sentence
    7·1 answer
  • A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
    14·1 answer
  • Operational level management can be supported by the systems except Select one: 01. Transaction Processing System 2. Manufacturi
    12·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!