1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
2 years ago
10

Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m

ethod of attack (or combination of attacks) would you use? How does your motivation for hacking impact the type of attack that you employ? Discuss how you might approach hacking and how the motivation for your hacking impacts the methods you would use.
Computers and Technology
1 answer:
liberstina [14]2 years ago
3 0

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

You might be interested in
What are the three major functions of a game engine?
zzz [600]
Three major functions of a game engine would be Physics, Programming, and an audio engine should be some major functions of a game engine.
4 0
3 years ago
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
How do I send the face to the back? Seriously, I can't find out how...
makvit [3.9K]

Answer:

i think you can layer it :)

Explanation:

nice drawing btw!

8 0
3 years ago
True or False? Any edition or version of Windows can join a domain.
Veseljchak [2.6K]

Answer: TRUE! 100%

If I was helpful i would to be rated brainliest please thank you!

Explanation:

8 0
2 years ago
What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
LuckyWell [14K]

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

4 0
3 years ago
Other questions:
  • WILL MARK BRAINLYIST
    15·2 answers
  • A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act
    15·2 answers
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    15·1 answer
  • What color is the smartart tolls tab?
    5·1 answer
  • Which statement will call this module and pass 12 as the argument?
    11·1 answer
  • Engineers at Edison Laboratories developed a _____ strip that allowed them to capture sequences of images on film.
    14·2 answers
  • Free points,
    15·2 answers
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • Cloud architects have been largely replaced by ScrumMasters.<br><br> True<br><br> False
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!