1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
6

1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini

ng security?
2. Penetration testing is a particularly important contributor to the incident management process. Explain why that is the case, and provide examples of how penetration test results can be used to improve the incident response process.
Computers and Technology
1 answer:
lawyer [7]3 years ago
6 0

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

You might be interested in
Which phone has the most GB (Gigo Bites)<br><br>A.Samsung<br>B.Iphone<br>C.LG<br>D.ZTE
Lina20 [59]
It's GigaBytes actually. And is it RAM or storage capabilities?

And also those are brands. Not models. For example, Samsung has different phones. Not just one.


7 0
3 years ago
Read 2 more answers
What is a specific challenge faced by information visualization researchers who are building an interface?
Mkey [24]

Answer:

 Information virtualization is the process of representing the abstract data such as numeral number and text into the form of visual which is human can easily understand.

The main challenges faced by the information visualization researchers are:

  • The main challenge which are faced by the information virtualization is during the data importing and also cleaning in the system.
  • It also not able to access the large amount of the data easily from the system.
  • Due to the poor selection of the scale and the coordinate rotation it also lead to the data distortion.
3 0
3 years ago
Help a fellow coder and anser these 5 questions
BlackZzzverrR [31]

Answer: yes because it helps

Explanation: it shows everything

4 0
3 years ago
Can i add ADSence on bangla content in blogsopt website?
Inga [223]

Answer:

I do not think you can! However, I am not sure since I mainly use Wix!!!

Explanation:

8 0
3 years ago
Emma is trying to decide whether to buy a new laptop. As a student, she has a budget and wants to make sure this is the right fi
Fudgin [204]

Answer:

What will I have to sacrifice if I buy this laptop

Explanation:

Emma by asking herself this question will scale her preference as well as compare her opportunity cost in determining if purchasing the laptop is importance to her at the moment and of what other thing will she be willing to sacrifice just so she could buy herself a laptop, and how the purchase would still be within her projected budget.

7 0
3 years ago
Other questions:
  • Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a
    12·1 answer
  • Where is the error in this code sequence?
    11·1 answer
  • True or false? LearnSmart (the "smart flash card assignments") really gets your competitive spirit in gear by allowing you to se
    8·1 answer
  • . public members are accessible from ________________ where the object is visible
    9·1 answer
  • What is the difference between digital art and digital design?
    8·1 answer
  • List of rules for expert systems​
    6·1 answer
  • Only one person can receive the same email at the same time true or false
    10·1 answer
  • Write a pseudocode to calculate the volume of a cylinder​
    12·1 answer
  • What is a disadvantage of communicating on social media?
    14·1 answer
  • What is a word processor write any five important features of word processor?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!