Computers and Technology, 10.03.2022 21:50 officialgraciela67
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance to gather extensive information on the company. She finds out the model numbers of routers and other devices by reading discussions between system administrators in forums. She also has a list of all the IT staff and their phone numbers. She also has the services running on ports on some machines she ran a network scanner on.
Required:
a. What reasonable steps should the company have taken to prevent Jane from finding this information?
b. What steps should the company take to prevent or reduce the efficacy of port scans?
Answers: 2
Computers and Technology, 21.06.2019 17:30
How are natural numbers, whole numbers, integers, and rational numbers related
Answers: 3
Computers and Technology, 22.06.2019 02:50
Which of the following had the greatest influence on opening the internet to the generly public
Answers: 1
Computers and Technology, 22.06.2019 11:10
Look at the far left lane in the picture. explain what the red car is doing and what it needs to do to travel safely.
Answers: 2
Computers and Technology, 22.06.2019 15:00
The three logical operators used to write compound conditions are "and," "or," and "not." a: true b: false
Answers: 2
Jane has an intent to penetrate the network in an organization. She has used passive reconnaissance...
Business, 25.04.2020 21:18
Business, 25.04.2020 21:18
Mathematics, 25.04.2020 21:18
Mathematics, 25.04.2020 21:18
Mathematics, 25.04.2020 21:18
Mathematics, 25.04.2020 21:18
Mathematics, 25.04.2020 21:18