1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
2 years ago
11

Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive informat

ion on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on.
Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?
Computers and Technology
1 answer:
LUCKY_DIMON [66]2 years ago
8 0

The  reasonable steps should the company have taken to prevent Jane from finding this information is to do a Vulnerability scanning or a A penetration test.

  • How To defend Against Port Scanning try and use or Install a Firewall and the use of TCP Wrappers.

<h3>What is  Vulnerability scanning?</h3>

This is a kind of passive reconnaissance techniques. This form of scanning is the process of auditing a said network. A vulnerability scanner is one that looks into the network or application to see issues but they do not attempt to exploit any vulnerabilities that is seen.

A penetration test (pen test) is known to be a form of ethical hacking that entails one to think like an attacker and find out ways to penetrate the target's security systems. This aim to:

  • Verify a threat exists.
  • Bypass security controls.
  • Actively test security controls.
  • Exploit vulnerabilities.

Learn more about penetration test  from

brainly.com/question/26555003

You might be interested in
Adios brainly, wont be posting that much take my points away i d c
mrs_skeptik [129]
Omg I would die to have your points because when I get on people call me a noob because I just got the app like 3 days ago and every time I answer a question some says noob like dang I just started
5 0
3 years ago
Read 2 more answers
Which function works best when you need to remove an element at a specific index in a list?
natka813 [3]

Answer:

You can use the pop() method to remove specific elements of a list. pop() method takes the index value as a parameter and removes the element at the specified index. Therefore, a[2] contains 3 and pop() removes and returns the same as output.

Explanation:

Hope it helps you!

8 0
3 years ago
Companies that develop software for sale are called software ____.
yanalaym [24]
Hello <span>Loveworld4058 
</span><span>
Answer: Companies that develop software for sale are called software vendors.


Hope This Helps
-Chris</span>
4 0
4 years ago
A queue processes elements in a _____ manner. <br> a. filo <br> b. lifo <br> c. lilo <br> d. fifo
sladkih [1.3K]

A queue processes elements in a <u> fifo</u> manner.

<h3>What is the rule that each stack and queue are understood by?</h3>

The rule used for a queue is to permanently remove the item that has been in the collection the most amount of time.

This policy is known as first-in-first-out or FIFO. The rule used for a stack is to always remove the item that has been in the collection the least amount of time.

<h3>What is queue how it is distinct from stack and how is it implemented?</h3>

The primary difference between Stack and Queue Data Structures is that Stack pursues LIFO while Queue follows FIFO data structure type. LIFO guides to Last In First Out. It means that when we put data in a Pile, it processes the last entry first. Conversely, FIFO guides to First In First Out

To learn more about FIFO,  refer

brainly.com/question/27952133

#SPJ4

3 0
2 years ago
What is the mass of the light bulb? a. 425.6 g b. 204.6 g c. 240.56 g d. 245.6 g
Veronika [31]
The answer to your question is ----> <span>245.6 g

Hope this answer has helped you. If it has, please mark it a brainliest. Thanks.

Have a BRAINLY day.</span>
4 0
4 years ago
Read 2 more answers
Other questions:
  • Constructors ________. initialize instance variables when overloaded, can have identical argument lists when overloaded, are sel
    11·1 answer
  • When enter a function or formula in a cell, which is the character you must type?
    14·1 answer
  • Which technology was used in fourth generation of computer​
    13·2 answers
  • Insert the components that the computer uses to perform the tasks of each of the parts:
    13·1 answer
  • What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
    9·2 answers
  • In the list [0, 13, 5.4, "integer"], which element is at index 2?
    11·1 answer
  • During system testing, developers test the program in an environment that is very similar to how the program will eventually be
    11·2 answers
  • Check all of the file types that a Slides presentation can be downloaded as.
    5·2 answers
  • What goes in between the &lt; &gt; when declaring a new ArrayList?
    14·1 answer
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!