1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
13

After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad

dresses and hosts, what does she scan next on the target's network to see if any are open
Computers and Technology
1 answer:
Gnoma [55]3 years ago
7 0

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

You might be interested in
An array similar to a phone book has 1000 names arranged as names [0], names[1]....names[999]. Nancy wants to search a name X in
sammy [17]

Answer:

b. The names in the list should be in alphabetical order.

Explanation:

A binary search is an algorithm used for searching for an item in a list or array. The algorithm first sorts the data structure into order and then divides it into halves. If the searched item is less than the middle item in the list, then the algorithm searches for the target in the first half, else, in the second half. This reduces the time complexity of the search.

5 0
3 years ago
1. What is the global marketplace?
VladimirAG [237]

I know the answer for 1 is A

5 0
4 years ago
Read 2 more answers
Sending an e-mail message to customers or potential customers of a legitimate website asking them to click a link that leads to
galben [10]
It is called phishing
3 0
4 years ago
The phrase ____ refers to an organization of components that define and regulate the collection, storage, management and use of
Burka [1]

Answer:

A. Database Management System

Explanation:

A Database Management System or DBMS is a set of programs that allow the DB administrator to the information extraction, storage and modification out of a database. It also provides tools to add, erase, modify or even analyze the data within the DB. Some examples of DBMS are MySQL, mongo DB, Ms SQL Server, etc.

3 0
4 years ago
a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
charle [14.2K]

Answer: a)Physical access

Explanation: Physical access is the function that permits the accessing of the  computer system in a physical way. This access work on the building, It organization and other physical buildings.This access make the system prone to high amount of corruption and hacking .

Other options are incorrect because technical access is for the accessing the technical parts,operational access is for controlling the functions and remote access is for accessing the system from remote area.Thus the correct option is option (a).

6 0
3 years ago
Other questions:
  • A _______ is used to analyze and summarize your data without graphical support. A. PivotChart B. PivotTable C. chart D. table
    8·1 answer
  • Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
    5·2 answers
  • HELP WILL GIVE BRAINIEST IF YOU HELP ME.....
    8·2 answers
  • It is a small hand tool used generally in decorative works such as making garnishes
    15·1 answer
  • Can you get in trouble for copying something you thought you were allowed too reddit?
    9·1 answer
  • What is the missing line of code?
    13·1 answer
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
  • HOW TO CHANGE GRADE IN SKYWARD!!
    10·1 answer
  • Which approach to bandwidth usage consumes all of the available frequencies on a medium to transmit data
    7·1 answer
  • How have the computers contributed in the banking ?<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!