1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
4 years ago
8

Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch

ing an attack.Discuss why whois databases should be publicly available.]
Computers and Technology
1 answer:
Elis [28]4 years ago
6 0

Answer:

The answer to this question as follows:

Explanation:

Whois database system and the nslookup software tool:

In each organization, the IP addresses can be identified by a hacker, that uses the whois database system and the nslookup software tool to attack certain IP addresses during most of the attack.

Whois databases system:

The Whois database systems must be made public because they're the key guide when finding a domain respondent or IP address chain.

You might be interested in
What are the two types of electronic components
IrinaVladis [17]

Answer:

The two type of electronic components are Active components and passive components

Active components are parts of a circuit that rely on an external power source to control or modify electrical signals. ... - Passive components like resistors, transformers, and diodes don't need an external power source to function. These components use some other property to control the electrical signal.

5 0
3 years ago
Read 2 more answers
.The __________ comes in handy when I'm using Microsoft Word to type an essay with a specific word number requirement
mihalych1998 [28]

Answer:

character count

Explanation:

The answer is probably character count.

6 0
3 years ago
The chip that controls the radio frequency waves within a device
torisob [31]

Answer:

An RF module

Explanation:

I googled it lol

7 0
4 years ago
Choose the missing method name.
leva [86]

Answer:

midpoint i'm pretty sure. :)

Explanation:

3 0
2 years ago
Which trait depicts honesty?
Aliun [14]

(B) reporting additional cash found in the cash register

5 0
4 years ago
Other questions:
  • I have a bag of trail mix.half of the bag contains peanuts.1/4of the bag is chocolates candies, and 1/4of the bag is dried fruit
    12·2 answers
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • What did Francis Ford Coppola and George Lucas create?
    10·1 answer
  • A selected graphic appears surrounded by a(n) ______, which has small squares and circles around its edges.
    7·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • What might happen if dispatchable threads were removed from the software hierarchy? A. Requests from the mouse would be ignored.
    9·1 answer
  • Discuss All control statements supported by Go
    13·1 answer
  • A student registers for a course in a university. Courses may have limited enrollment i.e a student must
    5·1 answer
  • Wilma is looking for facts about social media for her research project. What fact should she use for her project?
    15·1 answer
  • A hub is a central computer true or false?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!