1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
3 years ago
9

32 what windows command can be used to copy entire directories, including subdirectories?

Computers and Technology
1 answer:
navik [9.2K]3 years ago
5 0
Ctrl+a copies everything.
You might be interested in
Level of comfort that people feel
mafiozo [28]

Answer:

Standard of Living

Explanation:

The level of comfort that people feel when goods and services are available to them is the standard of living. If all the goods and services are available to them then we say that they have a good standard of living. And when goods and services are not so easily available then we say that the standard of living is low. And hence, we know this concept as the level of comfort or the standard of living.

8 0
3 years ago
Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts.
Snowcat [4.5K]

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

4 0
3 years ago
ANSWER QUICKLY!!!
Lunna [17]

In the above scenario, he create a relatively light website in a short span of time by using option A.

<h3>What is a website?</h3>

A website is known to be a composition of web pages and similar or linked content that is known by a common domain name and it is one that is often published on web server.

Note that In the above scenario, he create a relatively light website in a short span of time by using option A as it is the right choice to make.

Learn more about website from

brainly.com/question/13171394

#SPJ1

4 0
2 years ago
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
3 years ago
A _ is the acknowledgment of a potential noncomformity, or an opinion regarding an issue that is not covered by a standard
sleet_krkn [62]
Assumption - hope this helped took the test and got 100
5 0
3 years ago
Other questions:
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    9·2 answers
  • After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices
    10·1 answer
  • In microsoft windows when a window is minimized what happens to that window
    9·1 answer
  • Windows on the desktop are just one of many objects used in a graphical user interface (GUI)-- buttons, drop-down list boxes, po
    7·1 answer
  • Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive). Sample output w
    12·1 answer
  • If you decide to get married, a trade-off would be that you have to give up being single.
    12·2 answers
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • Launa is reviewing several videos from her friends doing the latest dance challenge before they are published on their own
    11·1 answer
  • Which one is better AMD Ryzen 5 Or Nvidia Gtx 2080 ti
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!