menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
Scanning refers to the act of probing a network using custom crafted packets to determine the ip addresses in use and whether ports are open or closed.
asked
Sep 13, 2019
49.1k
views
2
votes
Scanning refers to the act of probing a network using custom crafted packets to determine the ip addresses in use and whether ports are open or closed.
Computers and Technology
high-school
Daichi
asked
by
Daichi
8.1k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
3
votes
This statement is true
Marengaz
answered
Sep 17, 2019
by
Marengaz
8.0k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
May 17, 2018
50.0k
views
Sending packets with false ip source addresses is called ____. ip address spoofing a port scanning attack a ip address scanning attack none of the above.
TMichel
asked
May 17, 2018
by
TMichel
7.8k
points
Computers and Technology
college
1
answer
1
vote
50.0k
views
asked
Sep 19, 2019
198k
views
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability assessment scanning tools?
Gabriel Jablonski
asked
Sep 19, 2019
by
Gabriel Jablonski
7.2k
points
Computers and Technology
college
1
answer
4
votes
198k
views
asked
Nov 16, 2024
106k
views
TCP/IP Ports can be easily exploited. Do you think scanning them is helpful? How would you handle it without becoming intrusive or impacting performance?
James Irwin
asked
Nov 16, 2024
by
James Irwin
8.2k
points
Computers and Technology
high-school
1
answer
1
vote
106k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org