1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex777 [14]
3 years ago
7

A penetration testing manager is contributing to an RFP for the purchase of a new platform. The manager has provided the followi

ng requirements:_______
Must be able to MITM web-based protocols
Must be able to find common misconfigurations and security holes
Which of the following types of testing should be included in the testing platform?
A. Reverse engineering tool
B. HTTP intercepting proxy
C. Vulnerability scanner
D. File integrity monitor
E. Password cracker
F. Fuzzer
Computers and Technology
1 answer:
pochemuha3 years ago
5 0

The manager has provided the following requirements <u>Password cracker: </u>

E. Password cracker

<u>Explanation:</u>

MITM is used to protect from hackers where they can hack the web site and misused the data. Basically man is in middle that monitors the network traffics between to tcpip and address and login as unauthorized person.

As RFP is a bidding process for purchase new product or new platform with complete document in details.

End user has to take care of hackers attack and make sure it is protected with all security holes.

Fuzzer is tool where send user data and check the security vulnerabilities and make sure it is protected.

It is not considered as high accuracy.

You might be interested in
(a) List 5 keys we can type with our left hand fingers
ehidna [41]

Answer:

A) <em><u>a,s,d,f, and either g or caps lock</u></em>

B) <u><em>l,k,j,h, and, ;</em></u>

Explanation:

3 0
3 years ago
This is going to get taken down but I dont care add me on discord cause ima bored<br> -Red-#9847
Alex777 [14]

Answer:

I WILL

Explanation:

6 0
3 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
3 years ago
When you pass an array as an argument to a function, the function can modify the contents of the array?
taurus [48]
In most languages. Primitive data types ( char, int, float, bool, maybe string ) are usually passed by value, but compound data types are passed by reference, so you're not working on a copy but on the original.
8 0
3 years ago
HEYY GUYS START REPORTING ALL THE SPAMMERS PLSS!!!!! For the spammers, I hope you go to hell &gt;:c!!!!!!!!!!!
Molodets [167]

Answer:

i totally agree

Explanation:

4 0
3 years ago
Other questions:
  • 7 features of QBASIC
    6·1 answer
  • When numbers are changed in cells that are involved in formula is the formulas are automatically
    14·1 answer
  • What word describes the complexity of document
    13·1 answer
  • Jason needs to design the colors for a web site that make it easy to read. Which should he consider using?
    9·1 answer
  • Which of the following is a rule of thumb for cell phones or smartphone etiquette ?
    12·1 answer
  • Indicate the time efficiency classes of the three main operations (i.e., FindMax, DeleteMax, and Insert) of the priority queue i
    11·1 answer
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure
    14·1 answer
  • A selected graphic appears surrounded by a(n) ______, which has small squares and circles around its edges.
    7·1 answer
  • What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
    15·1 answer
  • swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment wh
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!