1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
15

Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s

cripts, and simulated exploits? Incident response plan Fail-open Vulnerability scanning Separation of duties
Computers and Technology
1 answer:
VikaD [51]3 years ago
5 0

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

You might be interested in
4. What two important events occurred early in the formation of the universe?
Annette [7]
C. When they separated it created the big bang
4 0
3 years ago
TWO QUICK QUESTIONS
andrezito [222]
I'm guessing 8? But I'm not 100% positive 
5 0
3 years ago
Which option describes wearable technology?
kotykmax [81]
My opinion is the answers A and D. I would choose A if you can only choose one, though.
7 0
3 years ago
Read 2 more answers
What is the largest decimal value you can represent, using a 86-bit signed<br> integer?
Nataly [62]

Answer:

2^{85}-1

Explanation:

Considering the number are stored using binary notations.

If there are total 86 bits and 1 bit is used as sign bit. Then in total one can have 2^{85} bit combinations since a bit can be either stored as 0 or as 1.

Therefore,  the largest number that can be stored will be 2^{85}-1.

To understand it in better way let's scale down the problem to 3 bits representation. The largest number that can be stored using 3 bits is 111 which in decimal form is 7 and is equal to 2^{3}-1.

4 0
3 years ago
Can you create energy?
Katarina [22]
There is a set amount of energy in the universe and you cannot destroy or create energy.
3 0
3 years ago
Other questions:
  • For Excel:
    5·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • <br> Help me please I need the correct answe
    10·1 answer
  • Always follow the routine "clean up while in use and clean up before keeping it".
    6·1 answer
  • I get such an error when I turn on the computer, how can I fix it?
    7·1 answer
  • Which is the OS that can be obtained for free or at a much lower price than other major operating systems?
    15·2 answers
  • 2. The<br>is the main and usually largest data storage hardware device in a computer​
    9·1 answer
  • In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
    9·1 answer
  • 7. Type the correct answer in the box. Spell all words correctly.
    8·1 answer
  • Radio spectrum is the part of the complete range of electromagnetic waves that is used for radio communication from
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!