1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timama [110]
2 years ago
10

Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m

ethod of attack (or combination of attacks) would you use? How does your motivation for hacking impact the type of attack that you employ? Discuss how you might approach hacking and how the motivation for your hacking impacts the methods you would use.
Computers and Technology
1 answer:
liberstina [14]2 years ago
3 0

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

You might be interested in
Microsoft Edge offers a pane where you can access favorite webpages, open webpages saved to your Reading list, and view the hist
shutvik [7]

Answer:

Hub      

Explanation:

A Hub is a networking tool linking of the different devices or other networking devices.In comparison to router or other a Hub has not routing tables or the guidance where it will sends the information and transmits the data in the network in the respective link.

The hub is used in the Microsoft Edge that provides a panel where we can access favorite web pages. The hub is also used in the  history of the previously visited web pages .

7 0
3 years ago
Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
Nikitich [7]

Answer:

Explanation:

The following code is written in Python and is a function that loops three times asking for the last name and first name. Then it uses this information to create a username. Finally, each of the names and usernames is printed on the screen.

def userName():

   for x in range(3):

       last_name = input("What is your last name: ")

       first_name = input("What is your first name: ")

       username = first_name[:3] + "#" + last_name[-3:]

       print(last_name + ", " + first_name)

       print(username)

7 0
2 years ago
After the security breach at CardSystems Solutions, a security assessment of the security measures used at the company proved th
Verizon [17]

Answer:

Was not PCI DSS- compliant.

Explanation:

This is a payment Card industry data security standard which is an information security standard that deal with branded credit card.

8 0
3 years ago
While your hands are on home row, both of your thumbs are on _____. the space bar the return key the mouse B and N
12345 [234]
The space bar is where your thumbs are
6 0
3 years ago
Read 2 more answers
Haya noticed that college students needed to dress up for presentations but never seemed to have any ties, or at least not very
VashaNatasha [74]

Answer:

I believe it's B

Explanation:

...but is it?

3 0
3 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • How many different integers can be represented with a 4-digit number in base 13?
    8·1 answer
  • Carlos, an algebra teacher, is creating a series of PowerPoint presentations to use during class lectures. After writing, format
    15·1 answer
  • Which best explains what a credit score represents
    10·2 answers
  • What's the difference between kilobyte and kibibyte, and why was the IEC convention for computer international memories made???
    9·1 answer
  • Does YouTube have the potential to change academia as we know it, or is that a bit of a stretch? Explain.
    9·2 answers
  • Determine the exact output of the code $str = "The quick brown fox jumps over the the lazy dog"; echo strpos($str, 'fox');
    6·1 answer
  • Why would it be hard to find the ideal CO2 level if the light intensity were very low?
    9·1 answer
  • Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method
    8·1 answer
  • Between the div tags below, type the code for a link to the second.html page. Use "Go to the Second Page" as the link text
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!