1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
6

1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini

ng security?
2. Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.
Computers and Technology
1 answer:
lawyer [7]3 years ago
6 0

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

You might be interested in
WILL GIVE BRAINLIEST PLEASE HELP / urgent
Alex Ar [27]
Web design is awesome! Alright, so -

If you want to call some attention to text, you need to focus on the basic essentials. 

You want your text to be brief and split up. If someone goes on your site and see's walls of text, they'll be overwhelmed and leave.

So, to call attention - make it brief, and split it up into nice paragraphs.

Another way to call attention to text is to have a <em>really </em>good colour scheme. Having text easy on the eyes attracts the reader more, and encourages them to dive deeper.

If your text is unattractive and hard to look at it, it'll certainly get their attention - but not the attention you want.

Finally, another way to call attention is with visual adjustments such as making text bold, making it <em>italicised, </em>making it ALL CAPS, <em>or just GOING CRAZY WITH UNNECESSARY TEXT ATTENTION ATTRACTING POWER!!!!!!!

</em>Ahem... Anyways, these are just a few ways to get their attention. =) If you need any other help, private message me because I love web development! =)<em>
</em>
4 0
3 years ago
nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
Natasha2012 [34]

Answer:

The longest codeword that could possibly be for "n" symbol is n-1 bits.

Explanation:

From the given information:

Suppose we are to consider a set of frequencies \mathtt{f_1,f_2,f_3 ...,f_n}, for which f is a symbol for the length n. Therefore, the longest codeword that could possibly be for "n" symbol is n-1 bits.

However, during the encoding for "n" in conjunction with n-2, then the possibilities for n are; \mathtt{\dfrac{1}{2}, \dfrac{1}{4}, ... \dfrac{1}{2^{n-2}}}

We can conclude that the longest codeword that could possibly be for "n" symbol is n-1 bits.

5 0
3 years ago
Write a method called classSplit that accepts a file scanner as input. The data in the file represents a series of names and gra
Lelu [443]

Answer:

public static void classSplit(Scanner file){

   int studentsOf21 = 0, studentsOf22 = 0,studentsOf23 = 0, studentsOf24 = 0;

   while (file.hasNext() == true){

       String studentName = file.next();

       int year = file.nextInt();

       switch (year){

           case 2021:

               studentsOf21++;

               break;

           case 2022:

               studentsOf22++;

               break;

           case 2023:

               studentsOf23++;

               break;

           case 2024:

               studentsOf24++;

               break;

       }

   }

   int totalGraduate = studentsOf21+studentsOf22+studentsOf23+studentsOf24;

   System.out.printf("students in class of 2021: %.2f%n", students2021*100.0/totalGraduate);

   System.out.printf("students in class of 2022: %.2f%n", students2022*100.0/totalGraduate);

   System.out.printf("students in class of 2023: %.2f%n", students2023*100.0/totalGraduate);  

   System.out.printf("students in class of 2024: %.2f%n", students2024*100.0/totalGraduate);

}

Explanation:

The classSplit method of the java class accepts a scanner object, split the object by iterating over it to get the text (for names of students) and integer numbers (for graduation year). It does not need a return statement to ask it prints out the percentage of graduates from 2021 to 2024.

4 0
3 years ago
Which of the following factors will have the greatest impact on your credit score? I. Length of Credit History II. Payment Histo
Veseljchak [2.6K]
<span>the one that would have the greatest impact on my credit score would be : B. II and III If you had a troublesome payment history, it would be very likely that you'll end up with credit score because you make yourself became untrustworthy and if you have a low Debt, people will trust your current financial condition and you will be more likely to earn high credit score</span>
5 0
3 years ago
Read 2 more answers
What is JavaScript? JavaScript is a _____ language.
disa [49]

Answer: dynamic computer language

Explanation:

JavaScript is a dynamic computer language. Hope this helps! (•‿•)

5 0
3 years ago
Read 2 more answers
Other questions:
  • You are the IT administrator for a small corporate network. Recently, you added a web server that runs services that need to be
    12·1 answer
  • Which country began expanding its borders with exploration in the late 16th<br>century?​
    15·1 answer
  • Carl wants to add a new slide to his PowerPoint presentation. Which option should he use?
    6·2 answers
  • Please help me answer this<br><br>number 1..
    9·1 answer
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • What is software infrastructure?
    15·1 answer
  • What is the first thing you should do to find a mean and range of data?
    14·1 answer
  • Implement a program called genes.py that does the following: a. Reads a DNA sequence t as command-line argument b. Reads strings
    9·1 answer
  • Add the following numbers in abacus 2436+9214​
    8·1 answer
  • How do you save a document in a format so that any reader can view it?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!