1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
8

Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch

ing an attack.Discuss why whois databases should be publicly available.]
Computers and Technology
1 answer:
Elis [28]3 years ago
6 0

Answer:

The answer to this question as follows:

Explanation:

Whois database system and the nslookup software tool:

In each organization, the IP addresses can be identified by a hacker, that uses the whois database system and the nslookup software tool to attack certain IP addresses during most of the attack.

Whois databases system:

The Whois database systems must be made public because they're the key guide when finding a domain respondent or IP address chain.

You might be interested in
Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 3
Anarel [89]

Answer:

The code to this question can be given as:

Code:

int lastVector = newScores.size() -1; //define variable lastVector that holds updated size of newScores.

newScores = oldScores; //holds value.

for (i = 0; i < SCORES_SIZE - 1; i++) //define loop.

{  

newScores.at(i) = newScores.at(i+1); //holds value in newScores.

}

newScores.at(lastVector) = oldScores.at(0); //moving first element in last.

Explanation:

  • In the given C++ program there are two vector array is defined that are "oldScores and newScores". The oldScores array holds elements that are "10, 20, 30, 40".
  • In the above code, we remove the array element at first position and add it to the last position. To this process, an integer variable "lastVector" is defined.  
  • This variable holds the size of the newScores variable and uses and assigns all vector array elements from oldScores to newScores. In the loop, we use the at function the removes element form first position and add in the last position.
  • Then we use another for loop for print newScores array elements.  
4 0
3 years ago
Which type of cause and effect organizer would be best for alisha to understand how crude oil becomes gasoline?
sukhopar [10]
The answer is 100% B. Flow chart.
5 0
3 years ago
Read 2 more answers
Which of the following techniques is used with a state of nature of uncertainty? A. Decision tree B. Laplace C. Break-even analy
miss Akunina [59]

Answer:

A)

Explanation:

7 0
2 years ago
Which statement regarding dialogues in multiplayer games is true? Dialogues are based only on players’ actions.
emmainna [20.7K]

D. Dialogues are based only on events that have occurred in the game.
8 0
3 years ago
Read 2 more answers
A restaurant owner wants to use a database to help his business. What would be a good thing for him to do first?
arsen [322]
C Ask himself what his purposes will be for using a database. You have to figure out the basics first
5 0
3 years ago
Read 2 more answers
Other questions:
  • Explaim Why the shape of a cell is hexagonal
    15·1 answer
  • Which word most strongly appeals to pathos?
    15·1 answer
  • To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
    9·1 answer
  • Write a program which asks the user to enter N numbers. The program will print out their average. Try your program with the foll
    11·1 answer
  • The word __________ refers to the numbers, words, or more generally, any collection of symbols that is manipulated by a program.
    7·1 answer
  • is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members a
    14·1 answer
  • Which of the following is the best name for a history report about world war 1
    7·1 answer
  • Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are
    5·1 answer
  • Can you guys give some samples of STEM-related studies?​
    7·2 answers
  • Explain the pros and cons of touchscreen, non-touchscreen, and hybrid devices:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!