1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Monica [59]
3 years ago
10

You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What lang

uage is the code in and does it seem likely to be malicious? import os, sockets, syslog def r_conn(ip) s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) s.connect(("logging.trusted.foo",514))
Computers and Technology
1 answer:
nignag [31]3 years ago
8 0

The code below is written in JavaScript and does not seem malicious.

<h3>What is a Malicious Code?</h3>

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

  • harming the workstation; or
  • destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
brainly.com/question/16698901

You might be interested in
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
Imagine that you've properly connected your multimeter into an operating circuit, and the meter's function/range switch is set t
Free_Kalibri [48]
If the meter is set to  read DC voltage in the 20 volt range and it displays a 1 then it should mean 1 volt assuming that the maximum reading would be 20 volts at that setting. But if it is only around 1 volt is might be more accurate to set it at say 2V range to get say 1.6 actual volts.
8 0
3 years ago
Read 2 more answers
You don’t design new software. Instead, you work with software that already exists to be sure that it keeps running smoothly. Wh
Arada [10]

Answer:

Explanation:

If you are developing software products, run complex projects, you should ... All the same, to make the right choice of an SDLC methodology, you ... Generally, there are stages involved in all the different methodologies. ... You will therefore have to keep both the old and new systems running for some time.

5 0
3 years ago
Read 2 more answers
A security risk to email is​ __________, which are fraudulent messages that prompt unwary users to reveal sensitive information
d1i1m1o1n [39]

Answer:

Option C is the correct answer for the above question.

Explanation:

Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.

The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-

  • Option A states about direct mail which is not a type of attack.
  • Option B states about instant messaging which is also not a type of attack.
  • Option D states about spam which is used to send the spam messages.
  • Option 'E' states about the mass mail which is used to send the lots of spam mail.
5 0
3 years ago
If wire rope guardrails are used, what also must be done?
inn [45]
Some sort of security  pole to hold the 2 ends together firmly <span />
6 0
3 years ago
Read 2 more answers
Other questions:
  • Three business partners are forming a company whose name will be of the form "name1, name2 and name3". however, they can't agree
    13·1 answer
  • Which option is NOT in the Link to portion of the Insert Hyperlink dialog box?
    5·2 answers
  • When preparing to communicate a solution to a design problem, you must:?
    5·1 answer
  • In which architecture is the application logic usually on the client side?
    8·1 answer
  • How much memory did the first smartphone have?
    11·1 answer
  • A chiropractor is looking at the Security Standards Matrix and believes that it is unnecessary to address the encryption and dec
    8·1 answer
  • When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
    8·1 answer
  • Is there any quantum computer in India?​
    9·1 answer
  • Virtualization:
    15·1 answer
  • What is computer science​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!