you want to be able to identify the services running on a set of servers on your network. which tool would best give you the information you need? answer port scanner protocol analyzer network mapper vulnerability scanner

Answers

Answer 1

Services running on a set of servers on your network. the tool would best give you the information you need  vulnerability scanner

What is mean by  vulnerability scanner?A vulnerability scanner is a piece of software created to examine networks, applications, and machines for vulnerabilities. These scanners are employed to identify a system's vulnerabilities. They are used to identify and find vulnerabilities in network-based assets like firewalls, routers, web servers, application servers, etc. that result from incorrect setups or poor programming. Both authenticated and unauthenticated scans are possible with contemporary vulnerability scanners. Modern scanners are frequently offered as SaaS (Software as a Service); they are delivered online and are shown as web applications. The installed software, open ports, certificates, and other host data that can be queried as part of its workflow can all be customised by the modern vulnerability scanner, as well as vulnerability reports.

To learn more about   vulnerability scanner refer to:

https://brainly.com/question/29534018

#SPJ4


Related Questions

What is one way sprite properties are the same as variables?

Answers

values that sometimes we want to just read, and sometimes that we want to write to.

Prefixe = "BCFHMPRSVT"
uffix = "at"
for p in prefixe:
print(p uffix)
Since Tat i not a word, the program need to be changed to print That intead of Tat. Add a conditional tatement to make the program print That intead of Tat

Answers

Answer:

prefixe = "BCFHMPRSVT"

uffix = "at"

for p in prefixe:

   if p == "T":

       print(p + "hat")

   else:

       print(p + uffix)

which python module and method are used to create a multiple regression model for a given data set? select one.

Answers

Answer:

Ols method from statsmodel module

Explanation:

The Python method that can be used to return the residuals is the model resid method.

What is module?

The variable has been declared as the "module", and the method has been meant to return the residual of the dataset. Resid is a method that returns the residual of a multiple regression model.

The Python system includes the PVM, an the interpreter that executes the bytecode. The PVM must convert the byte code instructions into machine code in order for the computer to run the machine code instructions and display the results.

This conversion has been carried out by the PVM interpreter. The interpreter that converts the code from bytes into machine code, which is subsequently transmitted to the computer processor for execution.

Therefore, The Python method that can be used to return the residuals is the model resid method.

Learn more about Python on:

https://brainly.com/question/30427047

#SPJ2

a technician is looking at sata interface specifications and notices a particular key associated with it. a technician usually keys a sata interface ssd as what?

Answers

A technician usually keys a SATA interface SSD as B key.

What is a SATA?

Serial Advanced Technology Attachment, or SATA, is an interface for transferring data between a computer's main circuit board and storage devices. It is also known as serial ATA. SATA took the place of the venerable PATA (parallel ATA) interface.

In contrast to multiple parallel streams, serial communication transfers data one bit at a time. Despite what might seem to be a parallel model advantage, serial transmission is actually less prone to interference, allowing SATA to operate at a much higher speed than PATA. Additionally, simpler and slimmer cabling is possible with the serial model.

SATA's initial iteration communicated at a speed of 150 MBps as opposed to PATA's 133 MBps.

Learn more about SATA

https://brainly.com/question/29661435

#SPJ4

if there are 10 routers between the source and destination hosts, how may internet processes will be involved on all devices?

Answers

two internet processes will be involved on all devices.

What does the internet process do with each TCP segment? Reassembles the TCP segments in order after removing each one from its packet, then sends the finished application message to the target application.The message source transfers data to a transmission medium using a transmitter. The message destination uses a receiver to extract data from the transmission medium.A message is a piece of data delivered over the internet, however before a message is sent, it is divided up into smaller pieces called packets. Using Transport Control Protocol (TCP) and Internet Protocol (IP), these messages and packets move between sources (TCP).

To learn more about Transport Control Protocol  refer,

https://brainly.com/question/14280351

#SPJ4

Ashton is creating a game that needs to check whether the player has picked up the secret object. What kind of statement should Ashton use?

A.
sometimes statement
B.
first/then statement
C.
conditional statement
D.
priority statement

Answers

Answer:

C. conditional statement

Explanation:

Ashton should use a conditional statement to check whether the player has picked up the secret object in his game. A conditional statement is a type of programming statement that allows a program to make a decision based on certain conditions. In Ashton's game, the conditional statement would check whether the player has picked up the secret object, and if they have, it would perform a certain action.

consider the constructor of the bankaccount class that has a parameter for the initial balance. which line of code is equivalent to this constructor body? balance

Answers

The line of code is equivalent to constructor body balance is:

A) this.balance = initialBalance;

About Constructor:

In object-oriented programming, a constructor is a particular method of a class or structure that initializes a newly formed object of that kind. The constructor is always invoked when an object is created.

An object's members can be changed to default or user-defined values using a constructor, which is similar to an instance method and typically has the same name as the class. A constructor, despite looking similar, is not a legitimate method because it lacks a return type. The constructor initializes the object, not the object itself, and it cannot be static, final, abstract, or synchronized.

Constructors are not expressly called and are only used once throughout their lifespan. The execution order of the constructor in a hierarchy of classes when a derived class derives from a parent class is a call to the constructor of the parent class first, followed by the constructor of the derived class. It is not possible to inherit constructors.

It is not necessary for users to create constructors for each class. Any access modifier can be used to declare a constructor. A constructor with the appropriate access modifier must exist.

To know more about constructor visit:

https://brainly.com/question/29999428

#SPJ4

The question is incomplete. Below is the complete question:

Consider the constructor of the BankAccount class that has a parameter for the initial balance. Which line of code is equivalent to this constructor body?

balance = initialBalance;

A) this.balance = initialBalance;

B) this.initialBalance = balance

C) balance = this.initialBalance;

D) this.balance = this.initialBalance;

how does the addition of this module affect the game’s difficulty OA. It changes the number of times a function is called based on the
player's skill level.
OB. It changes all the parameters in the game based on the player's
skill level.
OC. It changes the enemy sprite based on a chosen condition.
O
D. It changes the speed parameter based on a chosen condition.

Answers

The addition of this module affect the game’s difficulty is that:  It changes all the parameters in the game based on the player's

skill level.

How might gaming technology be used to improve education and growth?

Studies show that incorporating games into the classroom can boost engagement, promote social and emotional learning, and encourage students to take calculated risks.

Therefore, All video games incorporate the idea of difficulty. It is the driving force behind challenge in a video game, thus game designers need to give this component of the design process careful consideration if they want to create the experience they're going for.

Learn more about game’s difficulty from

https://brainly.com/question/29471587
#SPJ1

What it job is in charge of a software application development team that develops, designs, and tests software applications?.

Answers

Answer:

Software engineers design and create computer systems and applications to solve real-world problems. Software engineers, sometimes called software developers, create software for computers and applications.

Explanation:

Software architect job is in charge of a software application development team that develops, designs, and tests software applications.

What is the job?

A task that is completed, specifically one that is particular, as one of one's regular workday or for a set fee. A job is a regular, formal occupation for which you get paid. It is referred to as a career or employment as well.

To address real-world issues, virtual assistant design and build computer systems including software. For machines and applications, engineers known as software developers—write applications.

A designer is a senior web developer on a mobile development team who takes executive choices on software architecture. This was made to make sure that the data that is presented to them was to be maintained in the form of an application.

Learn more about the job, here:

https://brainly.com/question/17205577

#SPJ2

a video file typically contains a single codec that is used for both audio and video images. a. true b. false

Answers

Without requiring Flash, HTML5 capabilities offer native audio and video. It is straightforward to add media to a website thanks to the HTML5 “audio” and “video” tags. Thus, option B is correct.

What video file typically contains a single codec?

Press Ctrl+U to view the source on the page where the video is located. Now you can determine if a video is being played using Flash or HTML5 by looking for a tag like “object,” which is used by the Flash video player, or “video.”

To identify the media source and include a controls component so that the user can play and pause the media, set the src attribute.

Therefore, it is false that, Typically, a video file uses a single codec for both the audio and the video pictures.

Learn more about video file here:

https://brainly.com/question/21180610

#SPJ1

a cloud computing approach in which the service consists mainly of hardware and systems software resources is called:

Answers

A private cloud is a cloud computing infrastructure that is exclusively used by one client. Many of the advantages of cloud computing are combined with the security and management of on-premises IT infrastructure in this method.

What are system software and hardware?

Hardware and software make up the two categories that make up a computer system. The term "hardware" describes the actual, observable parts of the system, such as the display, CPU, keyboard, and mouse. On the other hand, software refers to a set of instructions that allow the hardware to carry out a certain set of activities.

What are some illustrations of software and hardware?

The Processor, Memory Devices, Monitor, Printer, Keyboard, Mouse, and Central Processing Unit are a few examples of hardware in a computer. Computer software consists of a collection of instructions, guidelines, and documentation that a computer system can use to carry out various activities.

To know more about hardware and software visit;

https://brainly.com/question/10937439

#SPJ4

Why do games usually have rules?

A.
to make them less fun

B.
to provide structure so that the game objective can be achieved

C.
so that they can be broken

D.
because it’s easier to program rules into a game

Answers

answer b:

games NEED structure to function usefully.

What type of story attempts to make you feel engaged by scaring you?

A.
love story

B.
horror story

C.
fantasy story

D.
bedtime story

Answers

Answer: B

Explanation: Horror

Forza Motorsport is a simulation video game series that involves cars competing against each other to be the fastest. What type of game mode does Forza Motorsport involve?

A.
turn-based game mode

B.
capture the flag game mode

C.
resource management game mode

D.
racing game mode

Answers

D racing game mode is the correct answe

Drag the tiles to the correct boxes to complete the pairs.
Match the different aspects of the marketing information systems to the scenarios that portray them.

Answers

Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.

What are the different marketing eras?Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.Interactive era, Individualized mail sent to various clients based on their unique preferences.Pre-marketing era , a town crier enticing shoppers to purchase a novel product, assuring that it is a one-of-a-kind.Research era , data analysis to determine the needs of the consumer and corresponding product marketing.In the era of mass communication, a business might advertise its goods in newspapers, magazines, and on the radio.      

To learn more about Marketing eras refer to:

https://brainly.com/question/9350735

#SPJ1

Differentiate between absolute cell referencing and relative cell referencing

Answers

The absolute cell referencing is constant and the relative cell referencing formula is copied to another cell.

What is cell?

All living creatures and bodily tissues are made up of the smallest unit that can live on its own. A cell is the tiniest, most fundamental unit of life, responsible for all of life's operations.

Absolute cells, do not change regardless of where they are replicated. When a formula is transferred to some other cell, the cell size references change. In the field, they are diametrically opposed.

As a result, the absolute cell referencing is constant and the relative cell referencing formula is copied to another cell.

Learn more about on cell, here:

https://brainly.com/question/3142913

#SPJ1

assembly programming is less difficult to program and less time consuming to debug than higher - level languages. true or false

Answers

It is very difficult to debug and understand the code of an assembly language. True

Why Is assembly language simpler to learn than high-level programming?Python is more sophisticated than assembly language. Assembly languages are low-level languages, whereas high-level languages such as C, Java, or Python employ 0’s and 1’s instead of numbers, symbols, and abbreviations.It will be more difficult to learn than the other Pascal-like languages. Learning assembly, on the other hand, isn’t much more difficult than learning your first programming language. Assembly is difficult to read and comprehend. If you don’t know, Assembly language certainly is.

To learn more about Assembly language refer:

https://brainly.com/question/29647047

#SPJ4

your company is experiencing a growth spurt and is ready to invest in a more sophisticated disaster recovery plan. currently the backup plan consists of a few spare computers in a storage closet, and data on the servers is duplicated weekly to an off-site backup service. the company owners have committed to acquiring additional servers to duplicate critical servers in their current network, and they want the servers to be configured identically to the servers now in use. the new servers will be stored at an off-site data center and updated every time the on-site servers are updated. what type of disaster recovery site is your company creating?

Answers

The type of disaster recovery site is warm site.

What is disaster recovery site?

Disaster recovery site is a secondary site of server to storage the data same as the data in main server.

Disaster recovery site is created for the purpose if the data in main server is loss or can't be access, the data in secondary storage can replace them.

Three type of disaster recovery site is,

Cold site is disaster recovery site but it not provide hardware element.Warm site is disaster recovery site with hardware element but the data not fully transferred to new hardware element.Hot site is disaster recovery site with hardware element and the data fully transferred to new hardware element.

Since, the question tell us the backup plan is to duplicated data in weekly period then is warm site.

Learn more about disaster recovery site here:

brainly.com/question/14086328

#SPJ4

designers can link multiple selected layers by clicking the input answer icon at the bottom of the layers panel.

Answers

In Photoshop designers can link multiple selected layers by clicking the group icon at the bottom of the layers panel.

What is Photoshop?

Photoshop is a program that Adobe has developed for image creation, graphic design, and photo editing. For pixel-based images, raster graphics, and vector graphics, the software offers a wide range of image editing features.

In 1988, Adobe Photoshop made its debut. It was initially developed by Thomas and John Knoll for Macintosh computers, but it is now accessible on Windows and macOS platforms.

Photoshop is a component of the Adobe Creative Cloud, which also offers well-known programs like Adobe Illustrator, Photoshop Lightroom, and Adobe Dreamweaver. Users of Photoshop Creative Cloud can work on image and graphic content from any location.

Learn more about Photoshop

https://brainly.com/question/16859761

#SPJ4

please help? i dont understand im new to the class and need a lot of help

Answers

Answer:

THERE ARE MANY TYPES OF FUNCTIONS IN ICT, in excel, VLOOKUP, IF, HLOOKUP, COUNTIF, SUM IF, COUNT, SUM, AVERAGE are all examples of functions.

THERE ARE FUNCTIONS of a computer system: Input, Processing, Storage and Output.

Explanation:

A function performs a specific set of operations on its input values to produce a single output value

kayla is dissatisfied with the configuration of her keyboard and mouse. she wants to reset the keyboard speed and the mouse pointer rate. which utility should she use to configure the keyboard and mouse properties?

Answers

The utility that she can use to configure the keyboard and mouse properties is Control Panel.

What is Control Panel?

Control Panel is built-in utility from Windows OS to view and change the system settings. The settings can be change is various include removing or adding software and hardware, change accessibility, change networking setting, or can control user accounts.

The additional setting also can be changed in Control Panel such as the drivers for video or audio, VPN, input devices such as keyboard or mouse, and tools for networking.

Since, the keyboard and mouse is a hardware and a input devices to computer, we can change keyboard and mouse setting or configuration in Control Panel.

Learn more about hardware here:

brainly.com/question/24370161

#SPJ4

I need help please!
c = 2
while (c < 12):
print (c)
c = c + 3

Answers

Answer:

11

Explanation:

Answer:

output:

2

5

8

11

Explanation:

the while loop will continue to run until the condition is false. In this case, the condition is false when c is greater than 12. The loop will run 4 times, and the value of c will be 2, 5, 8, and 11.

Functions can do all of the following except:
A)Ask the user for input.
B) Allow writing without proper syntax
C) Stop the program from repeating
D) Simplify code

PLS HELP ME ILL MARK YOU BRAINLEST

Answers

Answer:

B) Allow writing without proper syntax

Explanation:

Functions can do all of the following except Allow writing without proper syntax.

What is Syntax?

The placement of words and phrases in a particular order is known as syntax in English. The meaning of the entire statement can be altered by shifting the placement of only one word.

The placement of words has strict restrictions in every language, and proficient authors can bend these rules to create sentences that sound more dramatic or poetic.

When it comes to language, syntax is a complex subject that can be challenging to comprehend. To help you communicate clearly, we cover the fundamental principles and varieties of syntax in this book, along with several syntax examples.

Therefore, Functions can do all of the following except Allow writing without proper syntax.

To learn more about Syntax, refer to the link:

https://brainly.com/question/28182020

#SPJ2

Computer literacy means a person can perform basic computer operations such as using the Internet to search for information.
True
False
thank you too whoever answers this

Answers

Answer:

True

Explanation:

Computer literacy is having the knowledge and ability to use computers and information technology efficiently.

(q003) transformations in the way we learn and work are two of the more obvious ways in which culture has changed. in this respect, the invention of the internet and smartphones strongly resembles the invention of what other powerful communication system?

Answers

The invention of the internet and smartphones strongly resembles the invention of what other powerful communication system writing

What is internet?The Internet (or internet)[a] is a system of worldwide connected computer networks that communicate with one another using the Internet protocol suite (TCP/IP)[b]. A wide range of electronic, wireless, and optical networking technologies are used to connect private, public, academic, business, and government networks with local to global reach. The World Wide Web (WWW), which is made up of interconnected hypertext documents and applications, as well as electronic mail, phone service, and file sharing, are just a few of the many information resources and services available on the Internet.Information theory and efforts to create and connect computer networks that were the result of American research and development are at the root of the history of the Internet.

To learn more about internet refer to:

https://brainly.com/question/2780939

#SPJ4

which of the following statements holds true for search engine optimization (seo)? a.it refers to the process of improving an ads rank in 's online advertising listings. b.it refers to software that traverses available web links in an attempt to perform a given task. c.it refers to a temporary storage space used to speed computing tasks. d.it refers to the process of improving a page's organic search results. e.it refers to internet content that can't be indexed by and other search engines.

Answers

The statements that true for search engine optimization is it refers to the process of improving a page's organic search results.

What is search engine optimization?

Search engine optimization is a method to improving the visibility of the websites, page, or even application for customers when they search for it.

The visibility is important for websites, page, or application because with the great visibility the customers can easily give attention to the website, page, or application which if the websites or application is for business it can attract the customers to purchase their product or at least know about their product.

Organic search result is when the user search something in search engine often search engine will give the result for what user search and a ads. The ads is not organic, the organic one is if the customer visit a website that is no ads in search result of search engine.

So, search engine optimization is to create more visibility so the user can easily view the website without must be paid for ads, or in other the view is organic.

Learn more about search engine optimization here:

brainly.com/question/14097391

#SPJ4

a mobile device user is installing a map application. the app requests several permissions during installation. which permission is not legitimate?

Answers

Permissions like device's camera, contacts, or storage, NFC.

What permission should be avoided?

It is difficult to determine which of the requested permissions might not be legitimate without more information about the specific permissions being requested and the context in which they are being requested.

In general, it is not uncommon for mobile apps to request a variety of permissions, such as access to the device's location, camera, contacts, or storage. However, if an app is requesting permissions that seem excessive or unrelated to its intended purpose, or if the app is from an untrustworthy source, it may be a cause for concern.

In these cases, it is best to carefully review the requested permissions and consider whether or not to install the app.

To Know More About Mobile Devices, Check Out

https://brainly.com/question/4673326

#SPJ1

sally notices that she has the same set of 10 blocks in her code in multiple places. she decides to create a new block (procedure) in scratch so that she can simply replace those 10 blocks with one procedure. why would this be beneficial to sally when she debugs and reasons through her program?

Answers

Since Sally notices that she has the same set of 10 blocks in her code in multiple places. The option that would be beneficial to sally when she debugs and reasons through her program are:

(A) The procedure can make the code section more abstract, so she doesn't have to think through all 10 blocks each time she comes across them in her code.

(C) If there is an error in the procedure, she can fix the error in the procedure

What is a procedural error?

The discrepancy between a measured value and its true value is known as experimental error. In other words, the error or inaccuracies are what prevent us from perceiving a measurement that is 100 percent accurate. Every measurement has some degree of experimental error, which is fairly common.

When an experimenter disregards the methodological protocol, procedural errors happen. Videos frequently contain these flaws, which can sometimes be fixed by rescoring the data, but occasionally the data must be destroyed.

Therefore, Debugging is the process of identifying and resolving faults or bugs in any software's source code. Computer programmers examine the code to ascertain the cause of any faults that may have happened when software does not function as planned.

Learn more about debugs from

https://brainly.com/question/15079851

#SPJ1

See full question below

Sally notices that she has the same set of 10 blocks in her code in multiple places. She decides to create a new block (procedure) in Scratch so that she can simply replace those 10 blocks with one procedure. Why would this be beneficial to Sally when she debugs and reasons through her program?

Select two answers.

answer choices

a. The procedure makes the code section more abstract, so she doesn’t have to think through all 10 blocks each time she comes across them in her code.

b. The procedure will make the program more efficient, spending less time running the same set of 10 blocks over and over again.

c. If there is an error in the procedure, she can fix the error in the procedure without having to search through her code for each place the procedure is used.

c. If there is an error in the procedure, she can fix the error in the procedure without having to search through her code for each place the procedure is used.

what is a platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor?

Answers

Call manager is the platform used to provide telephony, video, and web conferences that can serve as an entry point to a threat actor.

What does a threat actor do?A threat actor, also known as a malicious actor, is a person or a group of persons who engage in an activity with the intent of harming computer systems, devices, networks, or other items in the cyberspace.Threat actors commit cybercrimes to target uncovered vulnerabilities and sabotage operations. Threat actors come from various educational backgrounds and have a variety of resources. Cyberattack frequency and classification are both rapidly evolving. Threat actors' backgrounds influence who they attack, how they attack, and what information they seek.The authors contend that in order to more effectively combat cybercrime, we should work to better understand cyber threat actors and the motives guiding their behaviour. The research distinguishes between three categories of cybercriminals: state-sponsored actors, organised crime gangs, and hacktivists.

To learn more about Cyberattack refer :

https://brainly.com/question/27665132

#SPJ4

you want to know what pages new users open most often after opening your home page, so you create a new path exploration in explore that you plan to share with a co-worker. who can see this new path exploration, by default?

Answers

It is accessible in read-only mode to everyone on your property. It is accessible to and editable by anyone on your property. You can share it with other users of the property so they can make changes even though only you can view it.

In Analytics, what is path exploration?

The path exploration approaches enable you to: Identify the most popular pages that new users access after visiting the home page. Find out what users do after an app exception.

What distinguishes path exploration from reverse pathing?

By default, path exploration displays your users' actions starting at a certain event or page and moving ahead. Backwards pathing enables you to choose a desired event or page and investigate how your people get there.

To know more about editable visit :-

https://brainly.com/question/21263685

#SPJ4

Other Questions
establish the relation among energy, density, strain and stress cluster analysis is particularly valuable for what type of marketing strategy? positioning cost leadership product differentiation segmentation what is the thin membrane that sticks to both shells and forms siphons that are used for drawing in and expelling water.membrane of bivalaves ' The states determine rules for all elections?TrueFalse Which equation can be used to find d, the number of dollar coins Giuliana has? 5. Two burgers and one hotdog cost $4.82. At thesame price, oneburger and two hotdogs cost $3.70.How much does a hotdog cost? Simplify (28x102)-(69x10 Write the final answer in scientific notation6.62x10-96.62x10-841x1041x10 Casey inherited $70000, and decided to invest some of the money in a savings account earning 1% interest per year, and the rest in a certificate of deposit earning 2% interest per year. If the interest from the certificate of deposit was $800 more than the interest from the savings account, how much did Casey invest in each account?Savings: Certificate of Deposit: Compared with people in developing countries, people in industrialized countries are more likely to eat. The examples of Washoe and Binta Jua show that animals:a. may be able to apply rules and standards to situationsb. may have some capacity for moral behaviorc. have some sense of dutyd. can cultivate the full range of virtues There is too much GORE in bullfighting. GORE is synonymous to: violence bloodshed cheating chaos VPK programs that do not meet the minimum readiness rate for ______ consecutive year(s) will have their provider eligibility terminated for five years unless granted a good cause exemption by the Office of Early Learning. What is the message of this poster? young men should join the navy. opportunities in the navy are limited. the navy is open to men and women. women should show support for the navy. If 3x y = 5 and 2x + y = 15, evaluate x^2 + 2y investopedia what are the costs for determining what is included in the acquisition of property, plant, and equipment? what is the slope of a line that is perpendicular to y = 2x + 3a. 2b. -2c. 1/2 d. -1/2 read each description below and determine whether or not it describes a function or property of cerebrospinal fluid. then, click and drag each box into the appropriate category below based on whether it is a true or false statement about cerebrospinal fluid (csf). A ti _____ _____________ comer fruta. (gustar)(1 Point) A textbook store sold a combined total of 429 chemistry and biology textbooks in a week. The number of chemistry textbooks sold was 51 more than the number of biology textbooks sold. How many textbooks of each type were sold? how many 3/4 cups serving aare in 5 1/2 cups of yogurt