1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slamgirl [31]
4 years ago
5

Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery

Computers and Technology
1 answer:
trapecia [35]4 years ago
5 0
D. Recovery because if you got hacked the hacker most likely will not want to recover the data.
You might be interested in
What is the full meaning of ICT
leva [86]
Information commination technology :)
6 0
4 years ago
Read 2 more answers
The point at coordinates (2, -18) is in what direction from the origin?
Arada [10]
I wish i could give an answer but see in dont think straight
3 0
3 years ago
Convert 105 decimal to 128 binary form
krok68 [10]

Answer:

1101001 is binary 105

128 in binary is 10000000

6 0
2 years ago
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
jeka94

Answer:

it would be amhv i think i hope it answered u'er question

Explanation:

8 0
4 years ago
A personal career profile for can be used to match what you know about yourself to what you know about different careers
mel-nik [20]

Answer:

B

Explanation:

give answers next time pls so i can help you!!

3 0
4 years ago
Read 2 more answers
Other questions:
  • Signs that a listener is paying attention include:
    10·2 answers
  • What is the best strategy to avoid paying interest on your credit card
    8·1 answer
  • A client is asking for a printing solution that will print three sheets of paper with identical information on each page with a
    13·1 answer
  • When you first launch the internet, what page will open?
    9·1 answer
  • Which is a software configuration management concept that helps us to control change without seriously impeding justifiable chan
    14·1 answer
  • An online travel agency such as Travelocity is an example of a(n) _____.
    14·1 answer
  • Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his c
    6·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • A large retail company hires several new joiners and would like to incorporate Virtual Reality (VR) into their onboarding proces
    11·1 answer
  • What was the name of the first computer, developed by charles babbage?.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!