1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
15

Which form of investigation aims at checking whether or not a target system is subject to attack based on a database of tests, s

cripts, and simulated exploits? Incident response plan Fail-open Vulnerability scanning Separation of duties
Computers and Technology
1 answer:
VikaD [51]3 years ago
5 0

Answer:

<em>Empirical technical </em>research has a fundamental objective, which is to provide objective and independent information on the quality of the product to the interested party or stakeholder. It is one more activity in the quality control process.

Explanation:

Testing is basically a set of activities within software development. Depending on the type of tests, these activities may be implemented at any time during said development process. There are different software development models, as well as test models. Each one has a different level of involvement in development activities.

In a full penetration testing process, there are pre-instances to run this tool, but to take the first steps it is probably the best way to start. Nmap is a network scanning tool that allows you to identify what services are running on a remote device, as well as the identification of active computers, operating systems on the remote computer, existence of filters or firewalls, among others.

In simple words, when a server or device is going to be attacked, the attacker can carry out different attacks depending on the service: it is not the same to damage a web server, a database server or a perimeter router. Therefore, in any deployment, the first step will be to identify the services in the infrastructure, to decide how to proceed and, considering that in a penetration test the steps of an attacker are “imitated”, it will also be started in the same way.

You might be interested in
Round Robin Algorithm
Reil [10]

Answer:

Please check the attachment.

Explanation:

avg turnaround time = (38+7+42+33+18)/5= 27.6

avg waiting timee = (33+5+28+23+17)/5= 21.2

And its D, A C in Gantt chart at last and exit time are 33, 38 and 42 mentioned as last three in Gantt chart.

7 0
3 years ago
Suppose that in a 00-11 knapsack problem, the order of the items when sorted by increasing weight is the same as their order whe
frosja888 [35]

Answer:

Following are the response to the given question:

Explanation:

The glamorous objective is to examine the items (as being the most valuable and "cheapest" items are chosen) while no item is selectable - in other words, the loading can be reached.

Assume that such a strategy also isn't optimum, this is that there is the set of items not including one of the selfish strategy items (say, i-th item), but instead a heavy, less valuable item j, with j > i and is optimal.

As W_i < w_j, the i-th item may be substituted by the j-th item, as well as the overall load is still sustainable. Moreover, because v_i>v_j and this strategy is better, our total profit has dropped. Contradiction.

8 0
3 years ago
Best motherboard cpu and ram combo thats cheap but good for gaming under 200
Leviafan [203]

Kinda hard for under 200

7 0
3 years ago
You've determined that your email program, Outlook, is not working, and your
Tanzania [10]

You've determined that your email program, Outlook, is not working, and your manager tells you to reboot your email program Go and restart outlook. If it begins offevolved and works fine, then Outlook is fine, if now no longer, continue to the following approach to troubleshoot.

<h3>Why is my Outlook Email now no longer working?</h3>

Remove and re-upload the e-mail account at the Outlook app. Check for any pending updates in your tool or for the Outlook app. Remove the Outlook app out of your telecellsmartphone and re-down load it out of your tele cellsmartphone's app save to make certain which you have the maximum up to date Outlook app. Restart your smartphone/too.

  1. Go and restart outlook. If it begins offevolved and works fine, then Outlook is fine, if now no longer, continue to the following approach to troubleshoot. Press the Windows key and press “r” to your keyboard and sort outlook.exe /reset navpane in the “Run” conversation box.
  2. Press “Enter” to run OutlookWhile the using of Microsoft Outlook, you may have come upon several forms of mistakes which restrict you from getting access to it completely.
  3. And one of the maximum encountered mistakes is ‘Outlook isn't closing’, even after clicking the go out button a couple of times.

Read more about managers:

brainly.com/question/24553900

#SPJ1

5 0
2 years ago
Describe the attacks in wireless networks that are more serious com pared to wired network
Julli [10]

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Other questions:
  • How does the browser display the same webpage whether you enter the URL or the IP address in the address bar? what system transl
    11·1 answer
  • When admitting digital evidence at trial, the issue of ________ comes up when the evidence involves computer-generated records.
    13·1 answer
  • Which of the following should be considered when conducting an audience analysis ?
    13·2 answers
  • What is secondary exchange ? - Apex
    14·1 answer
  • PLEASE DON'T DELETE THIS QUESTION!!!!
    15·2 answers
  • The MAC address is a _____ bit number.
    10·2 answers
  • In general, the farther you are from other road users, the A. lower your crash risk B.higher your crash risk C. slower they are
    6·1 answer
  • Word documents contain how many sections by default?
    9·1 answer
  • Now the y0utube home screen is gone
    13·2 answers
  • Which emerging technologies will have more injury on our day to day country &amp; How?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!