Which of the following open-source tools would be the best choice to scan a network for potential targets? Option 1: Microsoft Excel Option 2: Adobe Photoshop Option 3: Nmap Option 4: Mozilla Firefox

Answers

Answer 1
Answer:

Answer:

Nmap

Explanation:

Nmap is an open-source network scanner originally made for Linux (but then ported to Windows, macOS, and even BSD) created by Gordon Lyon (or alternatively known by his online moniker, Fyodor Vaskovich.)

First of all, Microsoft Excel is a spreadsheet making software. It's not going to be able to scan networks.

Adobe Photoshop is a photo editing program. That's not going to be able to scan networks either.

And Mozilla Firefox is a web browser. The only networks that's going to be scanning are the ones it connects to (to access webpages).

I hope this helps you!


Related Questions

Read the following scenario, and then answer the question below.Two of the computers at work suddenly can’t go online or print over the network. The computers may be trying to share the same IP address. Which strategy is most likely to solve the problem? A. rebooting the network server B. reconfiguring the network hubs C. installing network gateway hardware D. logging off one of the computers, and then logging back on
What does PowerPoint display when you use the Notes Page view?a. only the notes for an individual slide b. an individual slide plus any notes associated with the slide c. all the notes for all the pages, arranged in sequential order d. an individual slide, any notes associated with the slide, and the Slides/Outline pane
The process of combining rows and columns in a table is called _____.Choose one answer. a. marrying b. blocking c. banding d. merging
Which are four best practices used in the distribution layer? a. Disable trunking in host ports. b. Limit VLANs to one closet. c. Use HSRP. d. Use GLBP. e. Use VLAN spanning to speed convergence of STP. f. Use Layer 3 routing to the core. g. Summarize routes. h. Use RPVST+ as the STP with multilayer switches.
What are network operating systems

you can enter the correct range in a function by typing the beginning and ending cell references separated by a _______?

Answers

comma? i'm not sure i understan the question... do you have an example

Colon (:) is the answer.

If you want to stop the current flow through Device 3 in the circuit shown above, which one of the following single switches should you open

Answers

If you want to stop the current flow through Device 3 in the circuit shown above you should open the switch that does not affect the other parts of the circuit.

When do images or graphics in Microsoft Word hurt the document rather than help

Answers

Images or graphics have two key qualities which can impact the nature of the overall presentation or document they form part of:

  • Size and
  • Quality

The size of an image or graphics can be in terms of area (measurable in inches or centimeters) or pixels.

In either case, you don't want to have an image so large it takes up all the space on the page with little or no space for text and other items. This can hurt the document.

When documents have images with very large pixels, the overall size (in bytes) of the image becomes very large and sometimes difficult to open, upload, and transfer (subject to the speed or computing power of the computer being used to process it).

One feature of Microsoft Word which helps to optimize images is the Image Compression Tool.

For more about Microsoft Word and images, please see the following link:

brainly.com/question/14814976

Answer:

When images or graphics excessively occupy most of the space on the page.

Explanation:

For example, if you observed the attached image you'll see a bad example in which the image excessively occupies most of the space on the page making the written text difficult to read.

Next, a good example of proper editing is found in the next image, which shows the written text properly aligned with the text.

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?

Answers

Answer:

Vulnerability

Explanation:

Vulnerability: In information security, Vulnerability is defined as a weakness or flaw in the system which leaves it wide open to attackers to gain sensitive/confidential information and cause severe damage to the organization.

What can happen?

If this weakness doesn’t get treated, then the SQL injection attack is most likely to happen which will result in sensitive database being stolen by the hackers. This can cause serious implications for any organization hence it very important to take such vulnerabilities very seriously and dealt accordingly.

Waht is the default file extention for a file saved in Word 365?A.) .docext
B.) .doc365
C.) .doc
D.) .docx

Answers

i think that it is  .doc so c 

The default file extension for a file saved in Word 365 should be .doc (C)


Which of the following is NOT one of Facebook s main features? Private messages Posts from friends Status updates Web searching

Answers

I think it is web searching.