In: Computer Science
I DID STEP 1-2 AND 3 I JUST NEED A STEP 4 ANSWERS AND THIS IS SO EMERGENCY(DUE DATE TONIGHT) PLEASE HELP (I WILL GIVE UPVOTE AND GOOD COMMENT THANK YOU) if you need to see step 1-2-3 I can add on the comment.
Step 1 - WhoIs
Step 2 - TCP Port Scanning
Step 3 - UDP Port Scanning
Step 4 - Analysis ---- Answer these questions:
Hi, I would love to answer you with this question. I hope you will like an answer and get a clear idea related to the same. So not wasting much time let's get started.
Worry not I don't need you previous answer to help you with this.
The 4 part of the question is divided into three parts which are been answered as follows:
Ans.1 How can this type of scanning be used to help a network administrator protect a network?
Ans.2 How can this type of scanning be used to harm a network?
Ans.3 What did you learn from the results of these tests?
The following steps are been learned for the above answers and solutions
I hope you have got your answers. Please do comment to ask for queries.
Please give thumbs up to an answer and do comment for any queries
Thanks and Happy to help :)
HAPPY LEARNING