1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
konstantin123 [22]
3 years ago
9

Jensen is a senior developer for Hackers R'Us, a company that helps secure management information systems. Jensen's new task is

to break into the computer system of one of Hackers RUs' top clients to identify system vulnerabilities and plug the holes. What type of hacker is Jensen?
a. Cracker
b. white-hat hacker
c. Script bunnies
d Black-hat hacker
Computers and Technology
1 answer:
Harlamova29_29 [7]3 years ago
6 0

Answer:

b. white-hat hacker

Explanation:

A White-hat Hacker, also known as an Ethical Hacker is an information security specialist, known for performing penetration testing and checks in search for information and communications system's vulnerabilities on demand for his/her clients.

These efforts are meant to find security risks before someone else does, who could cause any kind of damage to the systems or unauthorized access to sensitive information

You might be interested in
Which font attribute would be most appropriate to make a papers heading stand out?
eimsori [14]

If you want your heading to pop out I would go for bold Becuase it shows the letters darker and bigger which would make the heading the center of attention.

7 0
3 years ago
Read 2 more answers
Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What
LiRa [457]

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

4 0
3 years ago
During an election year, why would a senator want to determine a mode?
ale4655 [162]

Answer:

To determine which issue is most important to the general public.

Explanation:

Took the Edge assignment!

3 0
2 years ago
(50 points) Jeff wants to create a responsive web page where elements change size according to the size of the window. How would
iris [78.8K]

Answer:

make the element sizes a percentage

Explanation:

Without using a framework specified for this type of thing such as Bootstrap, the best way to do this would be to make the element sizes a percentage. By making the size of everything a percentage it will automatically resize itself to take up the same percentage of the screen at all times. Even when the browser window is resized to any size that the user wants. This also applies to monitors of different sizes and mobile devices.

5 0
3 years ago
Puung.<br>f. Differentiate between second and third Generation Computer<br>IG ANSWER QUESTIONS​
Papessa [141]

Answer:

Second generation computers were based on transistors, essentially the same as first generation computers, but with the transistors replacing the vacuum tubes / thermionic valves.

Third generation computers used printed circuit boards to replace much of the wiring between the transistors. This had the advantage that components could be mass produced, reducing the number of errors because of incorrect wiring and making the component boards replacable.

6 0
3 years ago
Other questions:
  • Your wearable device synchronized with your smartphone this morning when you turned it on, but the two devices no longer are syn
    14·1 answer
  • WHAT IS A COMPUTER ????
    14·2 answers
  • What are 3 things that victims of cyber bullying can experience?​
    15·2 answers
  • Byron wants to use Quick Parts to insert reusable content into a company Word document. Where will he access this option? Design
    11·2 answers
  • How many times would the following loop iterate?
    15·1 answer
  • PAGE<br>DATE<br>0 What types of information should be there internet?​
    5·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • Create a PHP page that contains an array of at least 20 movie titles or book titles (your choice). The HTML page should have an
    7·1 answer
  • Another way to create a new presentation is from the Home tab
    6·2 answers
  • Barbara, an employee, has properly connected her personal wireless router to a network jack inside her office. The router is una
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!