1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
4 years ago
8

Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch

ing an attack.Discuss why whois databases should be publicly available.]
Computers and Technology
1 answer:
Elis [28]4 years ago
6 0

Answer:

The answer to this question as follows:

Explanation:

Whois database system and the nslookup software tool:

In each organization, the IP addresses can be identified by a hacker, that uses the whois database system and the nslookup software tool to attack certain IP addresses during most of the attack.

Whois databases system:

The Whois database systems must be made public because they're the key guide when finding a domain respondent or IP address chain.

You might be interested in
What is the symbol that causes the computer to perform string concatenation?
neonofarm [45]

Answer: In java the symbol "+" operator is used to perform string concatenation.

Explanation:

String concatenation refers to joining of two strings. So in java + is used to join strings which works provided one of the operands must be a String variable. Then it works by converting the other variable to String variable and joins the second operand to the end of the first operand.

An example of String concatenation is as follows:

int age = 10;

System.out.println("The boys age is " + age);

Output:

The boys age is 10.

here, the age is integer variable but as the phrase "The boys age is" is a String variable so it converts the age to String variable and joins both the Strings.

4 0
3 years ago
What is it called when two different files generate the same hashing result?
IrinaK [193]
A Hash<span> Collision Attack is an attempt to find </span>two<span> input strings of a </span>hash<span> function that </span>produce the same hash result<span>. ... If </span>two separate<span> inputs </span>produce the same hash<span> output, it is </span>called<span> a collision. </span>
4 0
3 years ago
Prepare a algorithm visualization for the Tower of Hanoi when 4 disks are to be moved from spindle #1 to spindle #3.
Setler [38]

Answer:

follwing is the code for Tower of Hanoi for n disks.

#include <iostream>

using namespace std;

void towofhan(int n,char source,char aux,char dest)//function for tower of hanoi..

{

if(n<0)

return ;

   if(n==1)//base case.

   {

       cout<<"Move disk 1 from "<<source<<" to spindle "<<dest<<endl;

       return;

   }

   towofhan(n-1,source,dest,aux);//recursive call.

   cout<<"move disk "<<n<<" from "<<source<<" to spindle "<<dest<<endl;

   towofhan(n-1,aux,source,dest);//recursive call.

}

int main() {

   int n=4;

   towofhan(n,'1','2','3');//function call.

   return 0;

}

Explanation:

If there is only 1 disk then we have to move the disk from source to destination.

Then after that we will apply recursion to solve the problem.

We have to work on only nth disk else will be done by the recursion.

First call recursion to move n-1 disks from source to auxiliary.

Then move nth disk from source to destination spindle.

Now move n-1 disks that are on the auxiliary spindle to destination spindle.

6 0
3 years ago
Which standard is commonly used on the Internet to represent non-numeric data?
mezya [45]
ASCI is the standard that is commonly used on the Internet to represent non-numeric data. ASCI stands for American Standard Code fro Information Interchange. This character encoding standard represents text in computers, telecommunications equipment, and other devices.  It assigns letters, numbers, and other characters within the 256 slots available in the 8-bit code
4 0
3 years ago
Donna is in the Outlook Today window and clicks the F1 button on her keyboard. What is Donna most likely trying to do?
Jobisdone [24]
I believe the answer is D. <span>use the Help feature of Outlook
In general, f1 is the shortcut to access help feature in almost all computer program.
Other than using this method, Donna could also use 'tell me what to do' phrase in the query box in order to access the feature.</span>
8 0
3 years ago
Read 2 more answers
Other questions:
  • When should an individual consider entering parenthood?
    5·1 answer
  • By generating and delivering timely and relevant information supported by networks, _____ creates new opportunities for conducti
    15·1 answer
  • Question 4 (1 point)
    12·1 answer
  • Is LTE faster than 4G?
    8·1 answer
  • What is an electronic path over which data can travel.
    7·1 answer
  • Write an if/else statement that compares the double variable pH with 7.0 and makes the following assignments to the int variable
    6·1 answer
  • Question 4 of 5
    5·2 answers
  • Given the following program: public class MysteryNumbers { public static void main(String[] args) { String one = "two"; String t
    13·1 answer
  • The Company should use BLANK cables to provide Fast connectivity without electrical interference
    6·1 answer
  • compare the two methods of creating table in ms access ( Datasheet view and Design view) which one wouldyou prefer to use to rec
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!