1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
2 years ago
12

Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a

ccess reconnaissance enumeration
Computers and Technology
1 answer:
jenyasd209 [6]2 years ago
7 0

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

You might be interested in
Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
dezoksy [38]

Answer: False

Explanation:

 The given statement is false, as the alarm filtering is the process of classifying the various type of IDPS alert in the system and it can be managed more efficiently.

The IDPS administrator can easily set an alarm filtering in the running system. It can generate the various types of positive tract in the system and then adjust the different alarm classifications. Alarm filters are same as the packet filter in which they can easily filter the items from the source and destination IP address.

3 0
3 years ago
1. Which of the following describes a way of memorizing a poem using a mnemonic device?
xenn [34]

Answer:

Singing the words of the poem to the tune of Happy Birthday"

Explanation:

Mnemonic devices are those tools which can be used to improve a persons ability to remember something efficiently. In short, it a technique to memorize something in short period of time and remember it for longer period of time.

Memorizing a poem by singing it to the tune of Happy birthday is also a technique to remember the poem and memorizing it efficiently.

3 0
3 years ago
TRUE/FALSE<br><br> The Interrupt Flag (IF) controls the way the CPU responds to all interrupts.
Nastasia [14]

Answer: True.

Explanation:

The value of the IF is very important to respond to the interrupts in the OS. It is a system flag bit. All the hardware interrupts will be handled if the flag value is set to 1 else all interrupts will be ignored. It takes two values either 1 or 0.

3 0
4 years ago
Explain briefly about two online reservation system
Rus_ich [418]

Answer:

An Online Reservation System is a software you can use for managing reservations for your service. ... Basically, an online reservation system allows a potential customer to book and pay for a service directly through a website.

Explanation:

An Online Reservation System is a software you can use for managing reservations for your service. Be it a pool, fitness center, gym, yoga studio, or a parks & recreation center an Online Reservation System allows all kinds of service businesses to accept bookings and appointments online and manage their phone and in-person bookings with ease.

Basically, an online reservation system allows a potential customer to book and pay for a service directly through a website. That means from the moment a customer decides they want to book a slot for your service (be it an in-house class or online appointment) to choosing a date, picking a time, and paying for the booking, membership management, everything is handled online! It greatly reduces the workload on your staff and removes the opportunity for double-bookings.

hope it helps

3 0
3 years ago
Read 2 more answers
Software on the nas handles features such as data storage, file access, and file and storage management. true or false
Alexus [3.1K]
True! pretty sure :D
7 0
3 years ago
Read 2 more answers
Other questions:
  • 7. Write a program in C to display the string "ARRAY" in the following format : A AR ARR ARRA ARRAY
    5·1 answer
  • One way to avoid carbon monoxide poisoning is to:<br><br> B. Open a rear window in your car
    9·1 answer
  • A merge is _____.
    5·2 answers
  • . Find four different commands in Internet Explorer and identify their keyboard shortcuts. A. B. C. D.
    10·1 answer
  • Is downloading like installing?
    13·1 answer
  • Taking a picture with a wide aperture creates a shallow depth of field. The subject is up close and in focus and defined while b
    12·2 answers
  • Is the internet a private place?
    15·2 answers
  • 4. Write technical term for the following statements
    15·2 answers
  • You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:,
    14·1 answer
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!