adplus-dvertising
frame-decoration

Question

What Unix command can you use to listen for input on a network port?
if [ $weekday==1 ]
then
 /usr/local/bin/nmap 192.168.1.1
elif [ $weekday==3 ]
then
 /usr/local/bin/nmap 192.168.1.2
else
 /usr/local/bin/nmap 192.168.1.0/24
fifor hst in range(0,256):
 ip= net + str(hst)
 print(ip, ': ', socket.gethostbyaddr(ip), '\n')

a.

grep

b.

sed

c.

awk

d.

nc

Answer: (d).nc Explanation:The nc command allows you to open a network port for listening and then direct the input received on that port to a file or executable.

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. What Unix command can you use to listen for input on a network port?

Similar Questions

Discover Related MCQs

Q. What is the limit to the number of elsif clauses in a Ruby script?

Q. Which of the following pairs of languages allow the direct concatenation of a string and an integer?

Q. What value would be used to encode a space in a URL string?

Q. What comparison operator tests for equality in Ruby?

Q. Which one of the following lines of code would create an array in a PowerShell script?

Q. Which one of the following PowerShell execution policies allows the execution of any PowerShell script that you write on the local machine but requires that scripts downloaded from the Internet be signed by a trusted publisher?

Q. Which one of the following commands will allow the file owner to execute a Bash script?

Q. Which one of the following statements does not correctly describe the Ruby programming language?

Q. Which of the following operating systems support PowerShell interpreters?

Q. How does modifying IP addresses in routine activities contribute to penetration testing?

Q. What is the role of automated code in the configuration analysis of target systems?

Q. How can scripting contribute to penetration testing?

Q. In penetration testing, what is the purpose of automated code that scans systems?

Q. How do libraries contribute to code reuse?

Q. What is the primary goal of attackers when launching remote access in penetration testing?

Q. How do procedures and functions contribute to code reuse?

Q. In penetration testing, what is the purpose of analyzing exploit code?

Q. What is the role of classes in code reuse?

Q. How is code reuse commonly achieved in software development?

Q. What is the root node in a tree data structure?