The reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.
- How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.
<h3>What is Vulnerability scanning?</h3>
This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.
A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:
- Verify a threat exists.
- Bypass security controls.
- Actively test security controls.
- Exploit vulnerabilities.
Learn more about penetration test from
brainly.com/question/26555003
Advantages
>fast processing
disadvantages
>limited service temperature performance
Answer:
lahat ng tao ay matalino kasama ka na dun kaya lang di natin ito inilalabas dahil natatamad tayo