Answer:
The value of k is 4
Explanation:
Solution
Given that:
k = integer
Input size = 500
The algorithm takes a run of = 16 seconds
Input size = 750
The algorithm takes a run of = 81 seconds
Now,
We have to determine the value of k
The equation is shown below:
(500)^k /16 = (750) ^k /81
Thus
(750/500)^ k = 81/16
= (3/2)^k
=(3/2)^ 4
k is = 4
There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.
Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.
They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software
Learn more from
brainly.com/question/14728460
Answer:
YESSS
Explanation:
So many people have made me cry!!