1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
2 years ago
12

Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a

ccess reconnaissance enumeration
Computers and Technology
1 answer:
jenyasd209 [6]2 years ago
7 0

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

You might be interested in
Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victor
tangare [24]

Answer:

The question is incomplete and should read as follows:

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore. What does Victoria need to do to run the antivirus software on System Restore?

This issue can be fixed by taking the following steps:

A. Disable System Protection.

B. Back up the restore point.

C. Enable System Protection.

D. Run the antivirus software on a restore point.

The system is then restored to the now clean restore point to rid the computer completely of the virus.

Explanation:

3 0
3 years ago
Read 2 more answers
Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
vaieri [72.5K]

Answer:

Bartering is the correct answer.

Explanation:

Kai is the engineer that setup his company of IT and his friend who sells the goods for his company. Then he decided to develop a software of the stock management for his friend's store for this his friend gives the required office goods and equipment for his company. So, the bartering is best suited for the following statement.

8 0
4 years ago
Read 2 more answers
Touchdowns were worth 7 points. Braydenand Gavin scored 7 touchdowns. Cole andFreddy's team scored 9 touchdowns. Howmany more PO
Lubov Fominskaja [6]

Answer:

14 points

Explanation:

Touchdowns are worth 7 points

Since Brayden and Gavin scored 7 touchdowns, they will have 7 * 7 = 49 points

Since Cole and Freddy scored 9 touchdowns, they will have 9 * 7 = 63 points

Cole and Freddy have 63 - 49 = 14 more points than Brayden and Gavin.

7 0
4 years ago
A software development company wants to reorganize its office so that managers and the Computer Programmers they supervise can b
Lelechka [254]

The best way to increase collaboration between a supervisor and her or his subordinates, which in this case is the computer programmers, would be through option (A) remove the private offices and cubicles and replace them with large desks and conference tables out in the open.

By choosing to implement an open office layout, greater communication between the supervisor and computer programmers would occur compared to when they were separated.

7 0
3 years ago
Which option can be used to access more settings than are available in the Backstage view?
Sedaia [141]

Answer:

Orientation settings

Explanation:

Orientation setting or general settings, we can find more options in Excel, we can make general and even advance setting with these options in the backstage view, the language and tabs can be changed in this section, the options are:

  • General
  • Formulas
  • Proofing
  • Save
  • Language
  • Advanced
  • Customize Ribbon
  • Quick access toolbar
  • Add-ins
  • Trust Center
6 0
4 years ago
Read 2 more answers
Other questions:
  • You have successfully compiled the file Hi.java, how do you run the corresponding program from the command line?
    7·1 answer
  • Keep the base of your _________ on the mouse pad or desk?
    12·2 answers
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    13·1 answer
  • Class secretType { public: static int count; static int z; secretType(); secretType(int a); void print(); static void incrementY
    8·1 answer
  • Resize vector countDown to have newSize elements. Populate the vector with integers {newSize, newSize - 1, ..., 1}. Ex: If newSi
    6·1 answer
  • Select the correct answer.
    11·1 answer
  • Anyone help me please​
    6·2 answers
  • One of the earliest computer networks was the ARPANET, developed in the early 1960s. The purpose of this network was to:
    13·2 answers
  • Beth is a software developer who is focused on identifying early-stage interface problems. Beth addresses the dimension of usabi
    11·1 answer
  • iv. Assuming the above operating system that cannot perform memory deallocation. Name at least three effects on the overall syst
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!