1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
2 years ago
10

Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m

ethod of attack (or combination of attacks) would you use? How does your motivation for hacking impact the type of attack that you employ? Discuss how you might approach hacking and how the motivation for your hacking impacts the methods you would use.
Computers and Technology
1 answer:
liberstina [14]2 years ago
3 0

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

You might be interested in
A corporate or government network that uses Internet tools, such as Web browsers, and
Alchen [17]

Answer: Intranet

Explanation:

The options include:

A. extranet.

B) social network.

C) intranet.

D) e-market.

A corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols is referred to as intranet.

Social networks are social media sites that are used by people which allows them to stay connected with one another.

E-market is a form of marketing whereby goods and services are promoted or advertised through the use of the internet.

Therefore, the answer to he above question is intranet.

3 0
3 years ago
What is the central idea of the second section:
Ivanshal [37]

Answer:

The second is that laughter prepares us for tough conditions. And it does always ensure good things for us, and there are many real advantages of the laughter that we can trace out. And all those can be parsed from our real life. We just need to think of a sad situation and try to realize how laughter helps us get rid of that sad situation. And that is what is the central idea of the second section.

Explanation:

Please check the answer section.

7 0
2 years ago
How are < embed > tags used in web page creation?
yKpoI14uk [10]

Answer:

The <embed> HTML element embeds external content at the specified point in the document. This content is provided by an external application or other source of interactive content such as a browser plug-in.

Explanation:

7 0
2 years ago
Are all the computer users known as programmer ​
Evgesh-ka [11]

Answer:

Nope

Explanation:

programmers are diff

6 0
2 years ago
What is the decimal number 75 in binary and hexadecimal?
hammer [34]

Answer:

00110111 00110101-Binary

3735-Hex

8 0
3 years ago
Other questions:
  • Image files are grouped into two categories: _____.
    5·1 answer
  • Which is a copyright
    5·1 answer
  • The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
    11·1 answer
  • What is the first step to creating a PivotTable?
    11·1 answer
  • Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick
    10·1 answer
  • Reports produced by the United Nations are considered
    11·2 answers
  • What are the characteristics of computer. Explain any one​
    15·2 answers
  • Do network packets take the shortest route?
    14·2 answers
  • Beginning in cell B21, complete the series of substitution values ranging from $35 to $45 in increments of $2.50 vertically down
    5·1 answer
  • Which protocol is often used in conjunction with ipsec to provide a remote access client vpn with user authentication?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!