1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
4 years ago
12

Under the guise of justice, some less scrupulous administrators may be tempted to ____________________, or hack into a hacker’s

system to find out as much as possible about the hacker.
Computers and Technology
2 answers:
o-na [289]4 years ago
8 0

Answer:

Under the guise of justice, less scrupulous administrators may even be tempted to back hack, or break into a hacker's system to find out as much as possible about the hacker.

Explanation:

Vilka [71]4 years ago
5 0

Answer:

Get into

Explanation:

You might be interested in
Which rule should be followed to stay safe online
yan [13]

Answer:

The rule that should be followed to say safe online is to never give out your personal information

Explanation:

because they can hack you.....

5 0
3 years ago
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
If i'm wanting to use hydra on linux to crack a password and the issue regarding hashes occurs, what shall i do?
Inessa05 [86]
Give up do research and then try again
7 0
4 years ago
Type the numbers 1-50 and then type Computers and Technology twice type it once forward and once backwards.
Ierofanga [76]

Answer:

Why?

Explanation:

7 0
3 years ago
Read 2 more answers
Which registry hive is loaded first during windows startup?
xz_007 [3.2K]
If i'm not mistaken it's "boot.ini"
3 0
3 years ago
Other questions:
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • An HP PC does not support the HP System Board Configuration tool, and you must use the HP System Board Replacement and System Di
    7·1 answer
  • In a PowerPoint presentation, it is not possible to add notes that are hidden from the audience's view.
    9·1 answer
  • If a person was on board a hypersonic airplane what do you think they would be able to see as they look out a window looking in
    13·2 answers
  • In a typical e-mail address the host is
    14·1 answer
  • Microsoft Windows is the least used operating system. TRUE or FALSE.
    13·1 answer
  • Micah may be able to repeat the last few digits in a phone number even if he was not paying attention. Because this is auditory
    13·1 answer
  • Which options can be adjusted in the print settings?
    8·2 answers
  • Company Wizzy is having trouble with network security. Issues with authentication, viruses, malware/spyware, and other network i
    12·1 answer
  • Which prefix indicates you are browsing a secure webpage
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!