1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
10

In ethical hacking testing, what approaches exist for the ethical hacker to choose from depending on how much information is kno

wn about the target system?
Computers and Technology
2 answers:
Brilliant_brown [7]3 years ago
5 0

Answer/Explanation:

Black Box Testing,

0,

Grey Box testing,

White box Testing

Amiraneli [1.4K]3 years ago
5 0

Answer:

Pen testing as a service, white box testing and internal pen testing

Explanation:

Pen or penetration testing is a strategy used by companies to harden their network security policies. It hires a pen tester to mimic an attack on the private network, providing little or no information to the tester and sometime with the members of the organization not being aware of the test.

There are several strategies penetration testers use to test for network vulnerabilities. They are black box test, white box test, internal test, external test, blind test, double blind test, pen testing as a service etc.

Some of these test provides information about the network to the tester like internal test, white box test and pen testing as a service.

You might be interested in
Difference between video game laser and projectile
jonny [76]
The laser is similar to the hitscan system. It moves quickly, so as soon as you shoot, the laser will instantly travel and hit the target where you aim. On the other hand, a projectile will travel to the target over time, meaning you have to account for the projectile dropping over that distance (and aim higher, in front of the target, etc.) to make sure you land the hit.
3 0
4 years ago
Electronic age,what format/equipment people use to communicate with each other?​
uranmaximum [27]

Answer:

They share or broadcast information by making a letter or information in a papyrus material. in industrial age they use Telegraph or typewriter to communicate each other.

4 0
3 years ago
Read 2 more answers
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
scoray [572]
,,,,,,,,,,,,,,,,,,,,,,
4 0
3 years ago
Which of the following could be true of two diffrent speicies that have competitieve realtionship in the same ecosytem?
chubhunter [2.5K]

they both an enemy that is the same but they also have a same niche so the have the same niche

6 0
3 years ago
Consider a multidimensional array A stored in row-major order with 22 rows and 6 columns whose subscripts start at 0. If each el
siniylev [52]

Answer:

Option c is the correct answer for the above question.

Explanation:

  • If the array will store in row-major order, then it will be a store like the first row, then second row and then third row.
  • If the user wants to conclude the address of the A[3,5], then the address of the A[3,5] will be 184.
  • It is because the 3 states the row number and the 5 states the column number.
  • The above question states that every value take 8 bit. and there are 4 rows from 0 to 3 and 6 column (0 to 5) for every row (except the fourth rows because it takes 5 columns from 0 to 4) before the A[3,5].
  • So there are 23 value before A[3,5] which are as-- [00,01,02,03,04,05][10,11,12,13,14,15][20,21,22,23,24,25][30,31,32,33,34].
  • So when every value takes 8 bit then 23 value takes 184 bits(23*8).
  • So the address of A[3,4] is 184.
  • Hence option c is the correct and the other is not because of 184 stated from the c option only.
4 0
3 years ago
Other questions:
  • In a formatted text file, ________ signal(s) the beginning and end of a formatting command.
    12·1 answer
  • What are the main types of computer software?
    5·2 answers
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • How to show neither precious nor accurate
    13·1 answer
  • How is communication within healthcare different than communication within other industries ?
    13·1 answer
  • Explain the relevancy of computers in today's global society​
    11·1 answer
  • Nd the errors in the following sentences. Underline with a red colour for
    9·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • Briefly explain how human thinking is mapped to artificial intelligence components
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!