1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
densk [106]
2 years ago
12

Which of the following tools might the security administrator use to perform further security assessment of this issue?

Computers and Technology
1 answer:
Y_Kistochka [10]2 years ago
4 0

Answer:

A.Port scanner

Explanation:

thats correct answer★

You might be interested in
How do i fix my profile picture it is stretched out
sveta [45]

Answer:

try resetting your account or change the picture and see if the other one is stretched out to

8 0
3 years ago
Once we have reached complete efficiency in the third part of the LRAS Curve, what occurs?
sergiy2304 [10]

your answer is c hope this helps


8 0
4 years ago
Have you ever used a device that relies solely on the cloud?
Morgarella [4.7K]
Yeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeesss i have
8 0
3 years ago
The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET
Phantasy [73]

The tool that sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET is called; Protocol

<h3>Understanding Protocols</h3>

In computer systems communications, a protocol is defined as a set of rules and regulations that allow a network of nodes to transport and receive data information.

Now, each transport layer in a system of network such as ARAPNET will always have a protocol set such as TCP and IP.

Read more about internet protocols at; brainly.com/question/17820678

3 0
2 years ago
Type the correct answer in the box. Spell all words correctly.
mel-nik [20]

Answer:

internet

Explanation:

8 0
3 years ago
Other questions:
  • When using the =SUM formula, you can add multiple cells together.<br><br> ☐ True<br> ☐ False
    7·1 answer
  • What is a catalyst? a chemical found in leaves a chemical which promotes a chemical reaction a chemical which reacts with sunlig
    10·1 answer
  • The emergence of MP3 (iPod) technology is an example of creative destruction because a. It is less expensive than compact discs
    14·1 answer
  • Write a program that: program starts; declares and initializes to .06625 constant float variable NJSALES_TAX; declares and initi
    8·1 answer
  • Which of the following views hides the ribbon and shows text on the screen in an easy-to-read format?: *
    11·1 answer
  • From your first impressions, write down what first comes to mind as to what is good or bad about the way the website/system work
    6·1 answer
  • My pc suddenly freezes and i can't open any apps or task manager. Apps do not open at all and if i restart from the start it get
    9·1 answer
  • What is the reason for taking care of design a good computer human interface ​
    9·2 answers
  • Encoding in the information processing theory is the process of _____
    5·1 answer
  • Which of the following statements is false? A. The internet has developed at a consistent rate throughout the world. B. There ar
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!