You want to make sure that a set of servers only accepts traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers do not accept packets sent to those services. Which tool should you use

Answers

Answer 1

Answer:

Port scanner.

Explanation:

A server can be defined as a specialized computer system that provides specific services for its clients on request. An example is a web server.

A web server is a type of computer that run websites and distribute web pages as they requested over the internet by end users (clients). When an end user request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser, a request is sent to the internet to view the corresponding web pages (website) associated with that particular address.

In this scenario, the tool you should use is a port scanner because it would scan all packets that are sent or received by the server i.e all packets that are being transmitted to and from the server.


Related Questions

The CPU is considered to be the............of a computer system​

Answers

Answer:

The Central Processing Unit (CPU) is the brain or main source of the computer system.

What are some college or high school social networking sites?

I already know of FB, LinkedIn, IG, Twitter, Snap but are there any other cool platforms?

Answers

Answer: discord mainly if you're into games

Explanation:

Answer:
They also use internet blogs

state 4 & circumstances under which warm
booting of a computer may be necessary​

Answers

Answer:

to close an open application

The ALIGN attribute of the P-tag cannot take what value right or left or justify or center?​

Answers

The align attribute of p tag can not take 'much' value

#LETS STUDY

#BRAINLEST LOVE❣️

Which option is used to insert a table in PowerPoint from another Office application?

In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.

Answers

Answer: In the Insert Object dialog box, choose Create from file.

Explanation:

To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.

After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.

Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she will choose the pen drive over the CD​

Answers

Answer:

More space

Pen drives generally have more storage capacity than CDs with CDs usually having just around 700 Megabytes for storage. Pen drives on the other hand can reach up to 2 Terabytes of data storage capacity. If the file she needs to save is high, Elsa should use the pen drive.

Scratch resistant

CDs can be scratched on the way to the house and lose some data or make it harder to extract. Pen drives do not have such problems are they are encased in an outer casing.

Portable and Accessible.

Pen drives are easy to carry which makes them portable and they are easier to use because a lot of computers do not have a CD drive but every computer has a port for a pen drive therefore making data in pen drives more accessible.

How many characters should a strong password have? four six eight ten

Answers

Answer:

I say it have to be aleast 8 to complete a strong password

Explanation:

it's common sense

Answer:

8

Explanation:

The more the better but ten too much

computer in country development explain explain explain in presentation.

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system (main software), and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster

Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"

Answers

Answer:

Using javascript, explanation with javascript comment

Explanation:

function guessNumber(){

var randomize= math.random()*10;

var roundrand= math.floor(randomize);

var getInput= prompt("guess number from 1 to 10");

var x= 3;

do(

if(getInput>roundrand){

Console.log("your guess is too high");

guessNumber();

}

if(getInput<roundrand){

Console.log("your guess is too high");

guessNumber();

}

else{

Console.log("you are correct pal!");

break;

}

)

while(x<=3)

}

/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/

"in a corporate environment, a well integrated management information system is a hacker's dream" . With reference to two examples, discuss the extent to which you agree or disagree to this statement

Answers

Answer:

Agree.

Explanation:

In a corporate environments systems are usually integrated to improve work efficiency. The more integration will result in well structured data organizing. It is necessary to put controls on misuse of this data. There should be strict internal controls placed in the system to avoid haccking as if there is hacck attack in one system, the whole integration may be haccked. The company should have backup plan in case of hacck attack so to completely shut down current system and work on another secured system to continue business operations.

Write a program that allows the user to continuously input the value n until a negative number is entered

Answers

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

Which tab on the ribbon is used to access the global Access 2016 options?

Home
Create
Database Tools
File

Answers

Explanation:

the answer is Database Tools

how are computer used in education and entertainment?​

Answers

Answer:

In Education:It improves students ability to learn fast as it helps us get information or research faster.It saves time.

In Entertainment:

It helps in movies by helping the producer to create special effects for some acts in a movie by making the impossible possible in movies.

full form of GHz ,CAI,CBT,ECG,GUI,ICU in computer​

Answers

Answer:

GHz - Gigahertz

CAI - Computer-assisted instruction

CBT - Computer Based Test

ECG - Electrocardiogram

GUI -  Graphical User Interface

ICU - Interface Converter Unit

Explanation:

Required

The full form of the given terms

The full forms have been stated in the answer section. Brief explanation is as follows;

GHz - Gigahertz

The clock speed of a computer

CAI - Computer-assisted instruction

Used to aid learning process; it encompasses texts, audios and videos.

CBT - Computer Based Test

An assessment done with the aid of a computer

ECG - Electrocardiogram

Used to record heart impulses

GUI -  Graphical User Interface

An interface that allows interaction between the user and the device through visuals.

ICU - Interface Converter Unit

A conversion device in the computer used to transfer data between computers.

ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do

Answers

Answer:

Enable the Erase data optionDisable the simple passcode option

Explanation:

Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.

Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

10 ICTs that encourage reading...?​

Answers

10 ICTs that encourage reading are given below:-

laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .

Hope it is helpful to you

Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press

Answers

Answer:

Printing Press

Explanation:

Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)

Therefore, the item that best represents technology transfer from the given answer choices is the printing press.

This is because, the printing press helped to print paper containing information which was sent from one location to another.

what are binary code​

Answers

Answer:

Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.

A binary code is a two-symbol system that represents text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently utilised as the two-symbol system.

Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or standard deviation.Specifically, redesign the library to have the following functions:mean(nums) Returns the mean of numbers in nums.stdDev(nums) Returns the standard deviation of nums.meanStdDev (nums) Returns both the mean and standard deviation of nums.

Answers

Answer and Explanation:

Using Javascript:

function mean(nums){

var array_numbers= new array(nums);

var meanofNums= array_numbers.reduce()/array_numbers.length;

Console.log(meanofNums);

}

Function Std(nums){

var OurArray= new Array(nums);

var meanOfnums= mean(nums);

var i;

for(i=0; i<=OurArray.length; i++){

OurArray[i]= OurArray[i]-meanOfnums*OurArray[i]-meanOfnums;

}

var al_stdOfnums= OurArray.reduce()/OurArray.length;

var stdOfnums= Math. sqrt(al_stdOfnums);

Console.log(stdOfnums);

}

function meanStdDev (nums){

mean(nums);

Std(nums);

}

/*From the code above, we have defined functions and used them in the last function definition meanStdDev (nums), making for code reusability. In defining the functions, we have followed the formulas for calculating mean and standard deviations and implemented in that order. Notice how we used a for loop in std(nums) function definition to iterate through the elements of the array nums, squaring each value and reassigning a new value for each element(using index value) in the array. We then added these values in array using reduce method, dividing by array length and square rooting the value using the math object method sqrt().*/

Which of the following is an example of a network layer (layer 3) protocol?

Answers

Answer:

IP

Explanation:

Well, when you say following, I'm guessing you mean:

UDP

TCP

Ethernet

IP

The answer is IP because, "The most significant protocol at layer 3 (also called the network layer) is the Internet Protocol, or IP. IP is the standard for routing packets across interconnected networks--hence, the name internet." - (ibm.com)

explain the working system of computer systems with examples​

Answers

,I don't know you all about computer

Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As

Answers

Answer:

Explanation:

#include <stdio.h>  

int main(void)  

{    

   int num, rem;

   printf("Enter a number: ");

   scanf("%d", &num);

   printf("Roman numerals: ");        

   while(num != 0)

   {

       if (num >= 1000)       // 1000 - m

       {

          printf("m");

          num -= 1000;

       }

       else if (num >= 900)   // 900 -  cm

       {

          printf("cm");

          num -= 900;

       }        

       else if (num >= 500)   // 500 - d

       {            

          printf("d");

          num -= 500;

       }

       else if (num >= 400)   // 400 -  cd

       {

          printf("cd");

          num -= 400;

       }

       else if (num >= 100)   // 100 - c

       {

          printf("c");

          num -= 100;                        

       }

       else if (num >= 90)    // 90 - xc

       {

          printf("xc");

          num -= 90;                                              

       }

       else if (num >= 50)    // 50 - l

       {

          printf("l");

          num -= 50;                                                                      

       }

       else if (num >= 40)    // 40 - xl

       {

          printf("xl");            

          num -= 40;

       }

       else if (num >= 10)    // 10 - x

       {

          printf("x");

          num -= 10;            

       }

       else if (num >= 9)     // 9 - ix

       {

          printf("ix");

          num -= 9;                          

       }

       else if (num >= 5)     // 5 - v

       {

          printf("v");

          num -= 5;                                      

       }

       else if (num >= 4)     // 4 - iv

       {

          printf("iv");

          num -= 4;                                                            

       }

       else if (num >= 1)     // 1 - i

       {

          printf("i");

          num -= 1;                                                                                    

       }

   }

   return 0;

}

The processor's ____ controls the timing of all the computer operations?

Answers

Answer:

system clock.

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

The processor's system clock controls the timing of all the computer operations.

This ultimately implies that, the central processing unit (CPU) of a computer depends or relies on the system clock which is typically designed to control the timing of all the operations performed by a computer.

Basically, the system clock is a small quartz crystal circuit and it measures the timing of a computer with respect to its operations.

Helllllllllppppppppppp

Answers

Answer:

9

Explanation:

"++" at the beginning increases your "x" by 1 before using it.

if it placed after your variable, it will increase it after your program used it.

What is the difference between a hard drive and a tape drive? Hard drives use magnetic heads and are fast to write data; tape drives write to disks and are fast to retrieve data. Hard drives write to disks and are fast to retrieve data; tape drives use magnetic heads and are fast to write data. Hard drives use magnetic heads and are best for archival data; tape drives write to disks and are used for ongoing backups. Hard drives write to disks and are used for ongoing backups; tape drives use magnetic heads and are best for archival data.

Answers

Answer:

A tape drive provides sequential access storage, unlike a hard disk drive, which provides direct access storage. A disk drive can move to any position on the disk in a few milliseconds, but a tape drive must physically wind tape between reels to read any one particular piece of data.

Explanation:

Architecturally tape drives are sequential storage, meaning that if you need to access some data at the end of the tape you needed to seek to the end and retrieve it. This can take seconds or minutes. Disks, OTOH are random access. Some hard drives use rotating media and movable heads , so the seek times are instantaneous , at least compared with tape drives. However, like tapes, there is a big advantage to using a rotating hard drive as sequential storage. It takes time, measured in milliseconds, for a head to move to another track. So traditionally, random access is much slower than sequential access.

SSDs have no internal moving parts so random access occurs in the same time frame as sequential access. Moreover, these drives usually have very high performance. For example, they can saturate a SATA data link, meaning that the SATA connection to the motherboard is now a bottleneck in disk access.

At one time tape drives were very popular. They were a low-cost alternative to using disks as backup. They were especially useful when IBM invented the Winchester “fixed” drive. This meant that the hard drive is fixed within its enclosure like they are today. Prior to this one could remove the drive pack and replace it. This was helpful when upgrading to a new version of the operating system as it was simple to replace the older drive pack should there be a problem.

Tape drives can be used in larger data centers, due to the fact that tape volumes can be removed and replaced so that the actual tape drive can backup many disk sets. Also the tape volumes can be stored off-site or in a fire-proof vault so this is valuable in a data recovery scenario.

What is the device that converts the signals to and from the wires so that the data can be sent and received by the computer?


A
domain name system

B
network

C
router

D
IP address

Answers

Answer:

E. Modem

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

In order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

In Computer Networking, a node is the physical device that make up a network and are capable of sending, receiving, creating and storing data in communication.

Examples of network nodes are routers, hubs, computer, switches, smartphone, printers, modem, etc.

A modem is a networking device that converts the signals to and from the wires such as a telephone line, so that the data can be sent and received by the computer.

Basically, a modem is an abbreviation for modulator and demodulator and as such it is designed to convert signal from one network device to signals that another network device such as a computer can understand or read.

When sending a signal (data) over a network, a modem converts (modulate) digital data signal to an analogue signal and transmits it over a telephone line or other communication lines. Also, when receiving an analogue signal, a modem converts (demodulate) the signal to a digital data signal.

how do I write a python function that takes a list and returns a new list with unique elements from the first list?

Answers

Answer:

Explanation:

The following Python program is a function that takes in a list as a parameter. It then uses the built-in dict class in Python to turn the input list into a dictionary and we call the fromkeys() method to remove all duplicate values. Then we turn the dictionary back into a list and save it into the variable called uniqueList. Finally, we return uniqueList back to the user. A test case has been created and the output can be seen in the attached image below.

def removeDuplicates(inputList):

   uniqueList = list(dict.fromkeys(inputList))

   return uniqueList

Elsa wants to save her work at the office to be continued at home either on a pen drive or CD. Outline three reasons why she will choose the pen drive over the CD​

Answers

Answer:

Pen Drive offers more accessibility

Not every device is equipped with a CD player but every device has a USB port for a pen Drive. Saving on the pen Drive will therefore enable the data to be more accessible.

Pen Drive has more space.

CDs usually have a storage capacity of below a gigabyte whilst pen drives can reach up to 2 terabytes thereby offering exponentially more space to save data.

Safety of Data

CDs are more prone to damage as data could be lost if the CD is scratches. Pen Drives on the other hand are encased in an outer case that protects the data.

Consider the following class interfaces:

class Teacher
{
public:
Teacher();
Teacher(string new_name);
string get_name() const;
private:
string name;
};
class MathsTeacher : public Teacher
{
public:
MathsTeacher();
MathsTeacher(string new_qualification, string new_name);
void display_data() const;
private:
string qualification;
};
int main()
{
Teacher t1, t2("John");
MathsTeacher mt1, mt2("TopLevel", "Sarah");
t1 = mt1;
t1 = t2;
mt1 = mc2;
mt1 = t1;
return 0;
}

Which one of the preceding assignment statements in the function main() would slice away the data of the derived class object?
A. c1 = ac1
B. c1 = c2
C. ac1 = ac2
D. ac1 = c1

Answers

Answer:

class teacher and student I didn't actually read it but I think it is class student

Other Questions
please see the question and solve plz Argue to the view that Vietnam will face the low birthrate and aging population that Korean society is experiencing. No es un autor neoclsico defbulas.a) Toms de Iriarteb) Flix Mara Samaniegoc) Moliered) Jean de la Fontainee) a y b find the exit angle relative to the horizontal in an isosceles triangle with 36 In 500 words decribe fluently the imagery in the peom Grey day at waterval farm by lionel murcott Is modern family a funny show, i fink i like it duh no though. I like the luke. He hits thoughs. BUT IS IT funny friends not so. Thanks Hayward Industries manufactures dining chairs and tables. The following information is available: Dining Chairs Tables Total Cost Machine setups 200 600 $48,000 Inspections 250 470 $72,000 Labor hours 2,600 2,400 Hayward is considering switching from one overhead rate based on labor hours to activity-based costing. Perform the following analyses for these two components of overhead: Compute total machine setups and inspection costs assigned to each product, using a single overhead rate. pls help mejust use an invented family (only mother father 2 brothers and 2 sisters)PRATIQUE FINALE DE FRANCAIS. I.-MAKE A GENEALOGICAL TREE OF YOURFAMILY.WRITING THE RELATIONSHIP IN FRENCH.II.- DESCRIBE YOUR FAMILY MEMBERS USING THEVERBS:SAPPELER, AIMER, AVOIR, ETRE, HABITER. Consistent with the ________ principle, plant assets should be recorded at cost, which includes all the normal and reasonable expenditures necessary to get the asset in place and ready for its intended use. Multiple choice question. plant asset cost full disclosure monetary unit An inlet pipe can fill an empty swimming pool in 5hours, and another inlet pipe can fill the pool in 4hours. How long will it take both pipes to fill the pool? Please answer these !!!!!!!!!!!!!!!!! Which of the following is an example of sharing personal information in a risky manner? posting about your favorite clothing brand sending an e-mail to a recipient you know using Microsoft Excel to create a spreadsheet searching for a restaurant on Can you help me please,? Calculate the trade discount amount of goods with a list price of $29,000 less trade discounts of 40 1/2 / 20 1/4 / 5 I already tried to look for this but the numbers are different from others and stuff can sb help me! Which function describes this graph? (CHECK PHOTO FOR GRAPH) A. y = x^2 + 7x+10B. y = (x-2)(x-5)C. y = (x + 5)(x-3)D.y = x^2+5x+12 6(x+8)=-36 what does x equal 1. Write a variable expression that matches the following situation: Marguerite wants to put a garland around her garden. If the length of the garden is 50 meters and the width of the garden is 2 more than the length, what is the perimeter of the garden? Select all the correct answers.Imagine that a strong foreign navy had blocked the ports near Rome. What would have likely been the biggest concern to the people of Rome?The city of Rome could run out of grain bought from across the sea.The city of Rome would be defenseless because the Roman army was far away.The trade in exotic goods from Carthage and Spain would be disrupted.The soldiers in the Roman colonies in Spain and Gaul could desert the army.The Roman government would run out of silver and bronze to make coins.HELP ME PLEASEEE PLEASE ANSWER THESE QUESTIONS NEED HELP Does one person have to fall in order for another to succeed?What can we do in our schools and lives to eradicate dangerous power dynamics that lead to devastating outcomes?