1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
8

Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch

ing an attack.Discuss why whois databases should be publicly available.]
Computers and Technology
1 answer:
Elis [28]3 years ago
6 0

Answer:

The answer to this question as follows:

Explanation:

Whois database system and the nslookup software tool:

In each organization, the IP addresses can be identified by a hacker, that uses the whois database system and the nslookup software tool to attack certain IP addresses during most of the attack.

Whois databases system:

The Whois database systems must be made public because they're the key guide when finding a domain respondent or IP address chain.

You might be interested in
If a line is 4’ and you scaled it using 1/8” =1’ what would the size of the line be?
Gnesinka [82]
One half inch to scale
8 0
3 years ago
An electric kettle has the resistance of 30ohms what will flow when it connected to a 240v supply... find also the power rating
SVEN [57.7K]

Answer:

Power = 1920 Watts or 1.92 Kilowatts

Explanation:

Given the following data;

Resistance = 30 Ohms

Voltage = 240 Volts

To find power rating of the kettle;

Mathematically, the power consumption of an electric device is given by the formula;

Power = voltage²/resistance

Substituting into the formula, we have;

Power = 240²/30

Power = 57600/30

Power = 1920 Watts or 1.92 Kilowatts

4 0
3 years ago
At the Data Link Layer of the OSI Model, what type of address is used to identify the receiving host?
Natalka [10]

Answer:

Mac Address

Explanation:

The MAC address or Media Access Control  is a unique identifier that each manufacturer assigns to their devices that can connect to the network.  They consist of 48 bits in hexadecimal form, grouped into 12 pairs of characters and each character is formed by four binary numbers, generally separated by a colon. MAC addresses are used in the data link layer of the OSI model, specifically in the lower Medium Access Control layer. An example of a MAC address could be:

10: 68: c5: 5e: 27: 3f.

6 0
3 years ago
Number the steps to describe how Tristan can complete
Lemur [1.5K]

Answer:

  1. Cut the Television and related equipment row.
  2. Click the plus sign on the left side of the table between  the last two rows.
  3. Paste the Television and related equipment row.

Explanation:

In order to move the row, Tristan should first select the row and then cut it. This will ensure that the row will be moved completely instead of copied.

Tristan should then hover with the mouse between the last two rows and click on the plus sign on the left side. It will add a new row to the sheet. between the last two rows.

Tristan should then select the topmost cell and click paste. The television row will be pasted there and Tristan would have successfully moved it.

4 0
3 years ago
Read 2 more answers
What are keywords? hep please give a good awncer
Anika [276]

Answer:

Keywords are words or phrases that describe content. They can be used as metadata to describe images, text documents, database records, and Web pages. ... Keywords are used on the Web in two different ways: 1) as search terms for search engines, and 2) words that identify the content of the website.

4 0
3 years ago
Read 2 more answers
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • Write a loop to print 10 to 90 inclusive (this means it should include both the 10 and 90), 10 per line.​
    6·1 answer
  • A device capable of copying a graphic, document, or other object is called a
    7·2 answers
  • And what way do you mixed and market economy support the ideals of democracy​
    12·1 answer
  • Interest accumulated on the principle of a loan must also be paid. The accumulated interest is known as which of the following?
    7·1 answer
  • What are the factors affecting the purchasing decision for dbms software?
    7·2 answers
  • What is an effective way to record change management? (5 points)
    9·1 answer
  • How can i fix a all white phone screen
    11·2 answers
  • How do you stop getting emails from brainly saying "sarah from brainly has answered your question"
    10·1 answer
  • 90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!