answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
2 years ago
7

Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

Computers and Technology
1 answer:
Scrat [10]2 years ago
6 0

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

You might be interested in
Which formula would you enter into C3, and then AutoFill into C4 through C6, to calculate the percent sales (Pct.) for the regio
inna [77]

Answer:

In C3, you would enter the formula:

  • =B3/$B$7%

Explanation:

Let's assume the first row is 1 and it contains the titles of the columns.  For instance, the content of the cellss A1:C1 could be:

  • A1: Region
  • B1: Sales
  • C1: Percent Sales

Also, assume the second row is empty and the cells on the first column, A, contain the names of four regions. For instance, North, South, East, and West:

  • A3: North
  • A4: South
  • A5: East
  • A6: West

The cells B3:B6 contain the sales for the four regions. For instance:

  • B3: 200
  • B4: 300
  • B5: 100
  • B6: 400

Then, you must calculate the percent sales for every region, in the cells <em>C3:C6.</em>

That means, you must divide the sale of every region by the total of sales and multiply by 100.

To do that in the worksheet you do this:

<u>1. Sum the sales for the regions:</u>

  • In cell B7 introduce: =SUM(B3:B6)

<u>2. Calculate the percent sale for the first region:</u>

  • In cell C3 introduce: =B3/$B$7%

That means that the reference B3 is relative: when you copy that formula, the column (B) and the row (3) will change accordingly to the cell where you will copy it.

Thus, by using the Autofill into C4 through C6, the column wil remain unchanged (C) and the row will change to 4, 5, and 6, respectively.

The symbol $ used in $B$7 make the reference absolute. That means that they will not change. The symbol % makes that the result is multiplied by 100.

<u>3. When you use Autofull into C4 through C6, you obtain:</u>

  • C4: =B4/$B$7%
  • C5: =B5/$B$7%
  • C6: =B6/$B$7%
4 0
2 years ago
PLEASE HELP!!~~
Law Incorporation [45]

Answer:

A

Explanation:

7 0
2 years ago
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no
elena55 [62]

Answer:

d. Port mirror

Explanation:

Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.

4 0
2 years ago
Use the Manufacturing database from "Excel Databases.xls" on Blackboard. Use Excel to develop a multiple regression model to pre
Dennis_Churaev [7]

Answer:

52.64

Explanation:

Multiple Regression:

Multiple regression generally explains the relationship between multiple independent or predictor variables and one dependent or criterion variable.

Please kindly check attachment for the step by step solution of the given problem.

6 0
2 years ago
Problem 1a. Write a function named hasFinalLetter that takes two parameters 1. strList, a list of non-empty strings 2. letters,
mash [69]

Answer:

The answer is the programming in Python language has strings and characters that has to be declared in the method.

Explanation:

#method

def hasFinalLetter(strList,letters):

output = #output list

#for every string in the strList

for string in strList:

#findout the length of each string in strList

length = len(string)

#endLetter is last letter in each string

endLetter = string[length-1]

#for each letter in the letters list

for letter in letters:

#compare with endLetter

#if we found any such string

#add it to output list

if(letter == endLetter):

output.append(string)

#return the output list

return output

#TestCase 1 that will lead to return empty list

strList1 = ["user","expert","login","compile","Execute","stock"]

letters1 = ["a","b","y"]

print hasFinalLetter(strList1,letters1)

#TestCse2

strList2 = ["user","expert","login","compile","Execute","stock"]

letters2 = ["g","t","y"]

print hasFinalLetter(strList2,letters2)

#TestCase3

strList3 = ["user","expert","login","compile","Execute","stock"]

letters3 = ["k","e","n","t"]

print hasFinalLetter(strList3,letters3)

8 0
2 years ago
Other questions:
  • Information gets from sensory memory to short-term memory through the process of _________.
    13·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • The bit width of the LRU counter for a 32 KB 16-way set associative cache with 32 Byte line size is
    13·1 answer
  • The matrix theory is used in the ___ technique
    8·1 answer
  • Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practic
    7·1 answer
  • What statement best describes Konrad Zuse?
    6·2 answers
  • Which item follows html instructions to assemble web pages
    13·1 answer
  • Write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). A function j
    11·2 answers
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • Explain why E-mail A is inappropriate for the workplace and revise it to be appropriate.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!