snalezinski8003 snalezinski8003
  • 13-12-2017
  • Computers and Technology
contestada

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​
a. ​sub7
b. ​metasploit
c. ​nmap
d. ​nessus?

Respuesta :

R00Ken
R00Ken R00Ken
  • 14-12-2017
The answer would be metasploit as it has tools for both scanning and exploiting a system.  Sub7 is a program used only for creating trojan horse exploits, nmap uses scanning techniques to create a map of a network and nessus uses scans to detect vulnerabilities in a system.  Metasploit is the only piece of software that has the functionality to do both.
Answer Link

Otras preguntas

What is the nth term in the sequence: 4, 7, 12, 19, 28 Please show working out
Inside which portion of a cell does translation take place? A. The endoplasmic reticulum B. The nucleus C. The cytosol D. The Golgi complex E. The cell membrane
An equilateral triangle has a perimeter of 18cm. What is the length of one of its sides?
Find two numbers whose product is -140 and sum is -4.
A square and a circle have equal areas. Which shape has shorter perimeter?
Luanne made a photocopy of a drawing of a rectangle. The original drawing was 4.5 inches wide and 6 inches long. The copy was 6.75 inches wide and 9 inches long
solve for x of (8x+30)°(4x+18)°
Which statement about the Islamic Golden Age is a fact rather than an opinion? (1) Islamic medicine was more advanced than Chinese medicine. (2) Poetry and lite
(a + 2b + 3c) − (4a + 6b − 5c) is equivalent to? Can you please explain with some details?
how do I factor this polynomial? q^2-121