snalezinski8003 snalezinski8003
  • 13-12-2017
  • Computers and Technology
contestada

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?​
a. ​sub7
b. ​metasploit
c. ​nmap
d. ​nessus?

Respuesta :

R00Ken
R00Ken R00Ken
  • 14-12-2017
The answer would be metasploit as it has tools for both scanning and exploiting a system.  Sub7 is a program used only for creating trojan horse exploits, nmap uses scanning techniques to create a map of a network and nessus uses scans to detect vulnerabilities in a system.  Metasploit is the only piece of software that has the functionality to do both.
Answer Link

Otras preguntas

What is the measure of an angle that is eight times its supplement?
A right triangle has side lengths 5,12, and 13 as shown below.
15. Using the Pythagorean theorem, find the length of a leg of a right triangle if the other leg is 8 feet long and the hypotenuse is 10 feet long. A
Andres company manufactures rectangular storage sheds decisions are made with aluminum side panels that measure 8 feet 10 feet 12 feet and 15 feet Along the bot
Shaw expressed his motivation for writing plays as ____
What were the main differences between the Articles of Confederation and the Constitution of 1787?
The solution set of axequalsb is the set of all vectors of the form wequalspplusbold v subscript h​, where bold v subscript h is any solution of the equation ax
Nonfiction today is chiefly important as
A major contribution of the psychoanalytic theorists is
Can HIV be transmitted by breast milk in the mouth