1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
7

Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

Computers and Technology
1 answer:
Scrat [10]3 years ago
6 0

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

You might be interested in
Question 2 of 10
Roman55 [17]

Answer:

C

Explanation:

correct answer

3 0
3 years ago
How do networks help protect data?
klasskru [66]
Network Security. Network Security protects your network from common security threats like viruses, worms, trojans, spyware, adware, identity theft, denial of service attacks and more. To protect yourself you could install an anti-virus/anti-spyware software like Kaspersky or Malwarebytes.
7 0
3 years ago
what is the worst-case big o running time for finding the maximum value in an array of size n by scanning from left to right and
Aleksandr-060686 [28]

Answer:

spanish

Explanation:

no ingles a me pisquen spanish soy tu amigos teacher

6 0
1 year ago
Which of the following computer component facilitates internet connection?
babunello [35]

Answer:

your answer may be(utility software)

8 0
2 years ago
Read 2 more answers
When a customer places an order atBookBox.com, the company processesthe customer's payment information,sends the order to the ne
mash [69]

Answer:

fulfillment management process

Explanation:

According to my research on the different business process', I can say that based on the information provided within the question this is best described as the fulfillment management process. Which is the process that a company goes through from accepting an order to delivering that order to the client. Which is what is happening in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • Anti-bullying laws in most states are designed to provide
    14·2 answers
  • Given a floating point variable fraction, write a statement that displays the value of fraction on the screen. Do not display an
    13·1 answer
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • write a simple assembly code using 8088 microprocessor instruction set to add two numbers ? please help me if you know :(​
    11·1 answer
  • IT professionals have a responsibility to educate employees about the risks of hot spots. Which of the following are risks assoc
    13·1 answer
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • Which of these functions may be used with positional arguments? Select four options.
    10·1 answer
  • Paula weeded 40% of her garden in 8 minutes. How many minutes will it take to weed all of her garden at this rate ?
    7·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
  • Consider the following code using the posix pthreads api:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!