1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
13

After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad

dresses and hosts, what does she scan next on the target's network to see if any are open
Computers and Technology
1 answer:
Gnoma [55]3 years ago
7 0

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

You might be interested in
What query class will you choose<br> for this query "women are evil"?
nikklg [1K]

Answer:

A) Gibberish or Vague Profane

Explanation:

Hope this helps

7 0
2 years ago
Interactive sites where users write about personal topics and comment to a threaded discussion are called A. networking sites. B
Viefleur [7K]

The answer is definitely C: Blogs.

Blog is somewhat very similar to a website. It is sort of a journal that is mostly maintained by one person, the blogger. They are updated regularly and can contain information related to a specific topic. In most cases, blogs are used as dairy diaries about politics, people’s personal lives, or social commentaries. They give you, as a blogger, opportunities to interact with your visitors while promoting your products.

3 0
4 years ago
Read 2 more answers
The digital revolution has affected a. almost all areas of movie-making, except makeup and hairstyling. b. only a small number o
Georgia [21]

Answer:

Option D is correct.

Explanation:

The Digital Revolution applies to technological improvements from optical automated and mechanical machines to that of the digital technology that is currently accessible. The era began well into the year of 1980s, and continues. That Digital Revolution still marked as the start of the Era of Info.

  • It's the evolution of electrical and analog to digital technologies.
  • Its the advent of digital technologies has also altered the manner of people communication.
  • The following things are only done through computers, cellphones, as well as the web.
5 0
3 years ago
PLS HELP MEE!!!
kramer

Answer:

starting with lowercase letters, using uppercase letters for the first letter in a new word

Explanation:

starting with a dollar sign, using lowercase for the remaining parts of each word

4 0
3 years ago
Which mobile game do play most pubg or call of duty mobile ​
Katena32 [7]

Answer:

Neither game, does anyone remember Angry Birds Epic though

Explanation:

That game brings me nostalgia

6 0
3 years ago
Read 2 more answers
Other questions:
  • How to jail break iphone 7 with <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="7617023602">[email&#160
    11·2 answers
  • There is an increasing need for private security personnel because of declining resources for many government agencies and a sho
    8·1 answer
  • 1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force
    8·1 answer
  • The following equations estimate the calories burned when exercising (source): Men: Calories = ( (Age x 0.2017) — (Weight x 0.09
    11·1 answer
  • You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
    13·1 answer
  • ______ communication channels develop outside the organizational structure and do not follow the chain of command.
    8·2 answers
  • In three to five sentences, explain the function of the computer's operating system.
    13·1 answer
  • What software application can be used to send and receive email messaging and management appointments in calendar's
    11·1 answer
  • What does HTML stand for?
    6·2 answers
  • While num_printed != num_stars: print('*') Sample output with input: 3 * * *
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!