1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
2 years ago
11

Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat

ion on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on.
Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?
Computers and Technology
1 answer:
LUCKY_DIMON [66]2 years ago
8 0

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

You might be interested in
Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
horrorfan [7]
<span>Digital cameras are less susceptible to UV light. TRUE. In fact, there is an existing photography called Ultraviolet Photography. It is a process of photography that records images by using the light from the ultraviolet spectrum. There are two possible ways to use UV in taking photographs: via reflected UV and UV induced fluorescence.</span>
4 0
3 years ago
Read 2 more answers
The following outline is used to plan a program. What is the name for this type of plan?
vladimir1956 [14]
Pseudocode is the answer
7 0
3 years ago
Read 2 more answers
Name the technique used to separate the mixture of colours in black ink ​
Nitella [24]

Answer:

chromatography

hope it helps

6 0
2 years ago
Read 2 more answers
What were the advantages and disadvantages of agricultural technology to us.
Digiron [165]

Advantages of technology in agriculture include expediting crop production rate and crop quantity, which in turn reduces costs of production for farmers and food costs for consumers, and even makes crops more nutritious and livestock bigger and meatier.

The excessive use of chemicals by the help of machines reduces the fertility of the land.Lack of practical knowledge the farmers cant handle the machines properly.While the cost of maintenance is very high.Overuse of machines may lead to environmental damage.It is efficient but has many side effects and drawbacks.

5 0
3 years ago
Read 2 more answers
Hard disk is a sequential data access medium. true or false?​
Crazy boy [7]

My answer is TRUE

Explanation:

Hope it help!!

3 0
2 years ago
Other questions:
  • Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
    12·1 answer
  • How does technology set a negative impact on the adolescent of our society?
    14·1 answer
  • // This pseudocode is intended to display // employee net pay values. All employees have a standard // $45 deduction from their
    12·1 answer
  • A model release can be either oral or written down. true or false
    13·2 answers
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • To prevent unauthorized access and use, at a minimum a company should have a written __________ that outlines the activities for
    6·1 answer
  • Where is 5G being used and how fast is it?​
    5·2 answers
  • What are the different Stape of data processing cycle?​
    8·1 answer
  • Explain why regular system cleanup is vital to ensuring the operating system runs efficiently. ?
    15·1 answer
  • Which artificial intelligence term is used to describe extracting information from unstructured text.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!