oyekaleadewunmi2018
oyekaleadewunmi2018 oyekaleadewunmi2018
  • 17-03-2021
  • Computers and Technology
contestada




Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?

​

Respuesta :

TJC07
TJC07 TJC07
  • 17-03-2021

Answer: It depends, but it is definitely a networking attack.

Explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data

Answer Link

Otras preguntas

Which of the objects is living or nonliving: Bacteria, virus, moss, you, a lemon seed, the air, bread, lettuce and rocks?
what are three important types of forces
Find the circumference of the circle 30m. use 3.14 for n
Modern Western ideas about freedom, the value of the individual, forms of government, and systems of law came from __________.
what was the major events that led the British to defeat
what are three important types of forces
Which of the objects is living or nonliving: Bacteria, virus, moss, you, a lemon seed, the air, bread, lettuce and rocks?
Modern Western ideas about freedom, the value of the individual, forms of government, and systems of law came from __________.
Why aren't all minerals gemstones?
what was the major events that led the British to defeat