1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
2 years ago
11

A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t

o know the operating system of a target device and scan for commonly used ports. Select the nmap commands that will be useful in this case. (Select all that apply.)
Computers and Technology
1 answer:
kondor19780726 [428]2 years ago
6 0

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

You might be interested in
A student will not be allowed to sit in exam if his/her attendance is less than 75% .
Oxana [17]

Answer:

Sorry, this is too vague to understand as you don’t have any charts, graphs, or anything

Explanation:

6 0
3 years ago
Application software sold with new device is called ________.
Vinil7 [7]

The name which is given to an application software which is sold with new device is called:

  • Killer application

<h3>What is a Killer Application?</h3>

This refers to the software which is necessary to the functioning of a core value of another technology.

With this in mind, we can see that because these application software are sold with new devices and are made to complement the core values of a tech, then they are referred to a killer app.

Read more about application software here:
brainly.com/question/1538272

4 0
3 years ago
Your friend sends you a photograph of his son. you want to enlarge the photograph. which program type will you use to make this
konstantin123 [22]
Reshade Image Enlarger
3 0
3 years ago
Why should you log into your online or mobile app account with the travel charge card vendor?.
yuradex [85]

The reason why I  should  log into my online or mobile account with the travel charge card vendor is that it provides easy access to statements, payments, and mobile alerts.

<h3>What is Travel Charge Card?</h3>

Travel Charge Card  can be regarded as a card that provides travelers with a safe as well as available method to pay for expenses that goes with official travel.

This can be done by Filing a dispute with the GTCC vendor within 60 days.

Learn more about Travel Charge Card;

brainly.com/question/17639468

6 0
2 years ago
What is an example of value created through the use of deep learning?
vichka [17]

An example of value which is created through the use of deep learning is: b. reducing multi-language communication friction in a company through automatic language translation.

<h3>What is machine learning?</h3>

Machine learning (ML) is also known as deep learning or artificial intelligence (AI) and it can be defined as a subfield in computer science which typically focuses on the use of computer algorithms, data-driven techniques (methods) and technologies to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or solved by using human intelligence.

In Machine learning (ML), data-driven techniques (methods) can be used to learn source ranges directly from observed multi-language communication.

In this context, we can infer and logically deduce that an example of value which is created through the use of deep learning is reducing multi-language communication friction that exist among employees working in a company through automatic language translation.

Read more on machine learning here: brainly.com/question/25523571

#SPJ1

8 0
2 years ago
Other questions:
  • Charles Lyell believed that:
    7·1 answer
  • QuickBooks Online (QBCU) Session 4: Post Assessme
    12·1 answer
  • Where are options to add a border around the outside of a chart found?
    9·2 answers
  • Which statement demonstrates a conflict of interest in an organization?
    9·1 answer
  • Given the class definition: class CreateDestroy { public: CreateDestroy() { cout &lt;&lt; "constructor called, "; } ~CreateDestr
    6·1 answer
  • Write a program that will sort an array of data using the following guidelines - DO NOT USE VECTORS, COLLECTIONS, SETS or any ot
    10·1 answer
  • The computer that can be used for performing the daily life tasks that might include emailing, browsing, media sharing, entertai
    11·1 answer
  • MR. Tom asked her students could they plant a flower and bring it to class. Sarah brought his flower and said it was a rose. Jam
    6·1 answer
  • MATH PLZ HELP ITS DUE IN 4 MINUTES​
    6·2 answers
  • Why key logger are essential for computer system
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!