1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
4 years ago
15

Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s

cripts, and simulated exploits? Incident response plan Fail-open Vulnerability scanning Separation of duties
Computers and Technology
1 answer:
VikaD [51]4 years ago
5 0

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

You might be interested in
In general, the pilot and _______ approaches are the most favored conversion approaches.
Karo-lina-s [1.5K]

Answer:

The correct approach is "Phased".

Explanation:

  • The pilot step requires just to validate the development's implementation goals and objectives and then when the SDMX objects were introduced to development, several perhaps all problems have indeed been detected as well as logged through so that they're being corrected either by the detailed technical advisory committee.
  • The staggered or phased approach towards deployment provides the time possible to obtain the very next knowledge on evaluation criteria, staff including diverse cultures such that the strategy produced could be customized accordingly.
6 0
3 years ago
a user reports that her or his mouse is not responding. Trying different mouse does not fix the problem? Which portion of the mo
deff fn [24]

Answer:

The southbridge chipset.

Explanation:

New motherboards or mobos has two types of chipsets known as: northbridge chips and southbridge chips. The northbridge chips are located at the upper part of the motherboard and perform major functions of the CPU. It is normally connected to CPU and works mostly with RAMs, memories AGPs etc. While southbridge are the lower part of the motherboard and mostly associated with the function of peripheral hardware like USBs and PCI slots devices including keyboard and mouse. Southbridge is also responsible for the function of audio, networking and others.

The reason why this problem occurs is probably a defective port (USB) or a software problem through motherboard drivers. To resolve this, you can re install the motherboard drivers or have the hardware fixed.

Note: this is NOT my answer. This is pricehenry031's answer. I actually dont know the answer to the question, but i thought this would help you.

8 0
2 years ago
Sophie Black works as a computer programmer for a software company. Her boss, Mike Jones, is responsible for developing a new so
kolezko [41]

Answer: B)Pirated software

Explanation: A software that is copied or distributed to other sources without persisting the legal rights or acknowledgement of the owner.This act is considered illegal because a legal licences is required to do such activity.

Other options are incorrect because counterfeit software is the coping and distribution of software through means of CD or DVD in any organization, ethical software is made with the code of ethics and governance software is the set of policies that is used for governing software. Thus, the correct option is option(B).

6 0
4 years ago
A cell is a box or rectangle in a spreadsheet where data may be entered.
PSYCHO15rus [73]

Answer:

True

Explanation:

sorry if im incorrect

4 0
2 years ago
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the WiFi
lora16 [44]
I mean, obviously evil twin. Not “evil win”!
8 0
3 years ago
Other questions:
  • When a relationship is established between two or more arrays by using the same subscript to relate entries between the arrays,
    14·2 answers
  • It is safe to tell an online acquaintance (someone you have never met in person) your
    12·2 answers
  • 1. What is the connection between a credit report and a credit score?
    8·1 answer
  • The data manipulation language (DML) of SQL contains SELECT, INSERT, DELETE, and UPDATE statements, whereas the data definition
    12·1 answer
  • What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
    11·1 answer
  • HELP!' Prompt<br> In a table, what is a field?
    12·1 answer
  • Edhesive 3.3 lesson practice
    5·1 answer
  • No links it’s just a normal question about iPhones.
    8·1 answer
  • 1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
    11·1 answer
  • 12. Fill in the blanks: In a ____________, the root of the tree is labeled _______________, children of the root are the names o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!