1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
10

In ethical hacking testing, what approaches exist for the ethical hacker to choose from depending on how much information is kno

wn about the target system?
Computers and Technology
2 answers:
Brilliant_brown [7]3 years ago
5 0

Answer/Explanation:

Black Box Testing,

0,

Grey Box testing,

White box Testing

Amiraneli [1.4K]3 years ago
5 0

Answer:

Pen testing as a service, white box testing and internal pen testing

Explanation:

Pen or penetration testing is a strategy used by companies to harden their network security policies. It hires a pen tester to mimic an attack on the private network, providing little or no information to the tester and sometime with the members of the organization not being aware of the test.

There are several strategies penetration testers use to test for network vulnerabilities. They are black box test, white box test, internal test, external test, blind test, double blind test, pen testing as a service etc.

Some of these test provides information about the network to the tester like internal test, white box test and pen testing as a service.

You might be interested in
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
Naomi wants to search for online courses on web development she types this term in the address bar which browser allows her to u
natka813 [3]
Google Chrome browser
4 0
4 years ago
Explain the first to four generations of a computer​?
goblinko [34]

Answer:

<u>First generation are</u>

a)they are unreliable

b)they are very costly and

c)huge in size

<u>Second generation are</u>

a)they use a transistor

b)smaller in size compared to first generation

c)they are faster than the first generation

<u>Third generation are </u>

a)its more reliable than the first generation and the second generation

b)faster than first generation and the second generation

c)consume less electricity

<u>Fourth generation are</u>

a) they are very cheap

b)they are very small in size

c)they are portable and reliable

Explanation:

explanation is in the answer

3 0
3 years ago
Let cell E2 = 100, what is the result of this formula? =NOT(E2&lt;100) *
lukranit [14]

Answer:

True

Explanation:

7 0
3 years ago
Which keyboard shortcut can you use to copy data from a cell? HURRY UP PLZ RIGHT NOW HURRY.
Romashka-Z-Leto [24]
The keyboard shortcut used to copy data from a cell is A.) Ctrl + c command +C

I hope this helped!! :)
7 0
3 years ago
Read 2 more answers
Other questions:
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • If the Update Automatically option is chosen in the Date and Time dialog box, _____. the date will automatically change each tim
    7·1 answer
  • Elaine works in a production house, and she determines the visual aspects of films and television. what is her profession?
    8·1 answer
  • The __ contains the computers “brain,” the central processing unit (cpu)
    9·1 answer
  • when you type a day, month, or date, what features does Word use to automatically complete typing the day, month, or date for yo
    6·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • How do cybercriminals use JavaScript maliciously?
    11·1 answer
  • Explain what iteration is and why we need it in code
    11·1 answer
  • What are software applications?
    14·1 answer
  • What are the four components of security documentation?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!