1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
6

Which of the following is the most effective password?

Computers and Technology
2 answers:
Ksju [112]3 years ago
6 0

the answer is B. M3r(urY      

GOOD LUCK !!!!!!!

zzz [600]3 years ago
5 0
I would have to say that the M3(ury would be the MOST effective, because it has more capitals, numbers, and symbols, which would make it harder to hack into.
You might be interested in
Does anybody know a better app I can use instead of Brainly
melomori [17]

Answer:

Education subreddits on reddit

Explanation:

6 0
3 years ago
Read 2 more answers
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
Select all of the following statements regarding security policy that are true.
a_sh-v [17]

Answer:

C and D

Explanation:

Your company should have a written security policy, and all employees should have access to the policy, even if they're casual workers.

Also, Training on computer security should be provided for all staff members as a prerequisite to start work.

3 0
3 years ago
During working hours an electrician should not wear
Arlecino [84]
B. a wristwatch or rng because you and get electrocuted 
3 0
2 years ago
Plz help code practice for python
laila [671]

Answer:umm

Explanation:

6 0
2 years ago
Read 2 more answers
Other questions:
  • Encryption relies on the use of _________to ensure that information is readable only by the intended recipient.
    5·1 answer
  • The rubric given to them by their teacher requires that
    14·1 answer
  • The cyclical, multistep process by which designers and engineers design, build, and taste a new product is called:
    9·1 answer
  • What determines how large the crystals in an igneous rock will be?
    15·2 answers
  • What is the biggest type of gear?<br><br>A. Spur<br>B.Worm<br>C.Wheel<br>D.Pinion
    6·2 answers
  • WEP (Wired Equivalent Privacy) has a design flaw which allowed attackers to break its encryption codes, WPA2 ( 2) has not suffer
    7·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? &amp;&amp;&amp; """ %%% ###
    5·1 answer
  • You wrote a program to allow the user to guess a number. Complete the code to generate a random integer from one to 10.
    8·2 answers
  • Which unit of computer is used to processed data?​<br>Please help!!!!!!
    7·2 answers
  • How could the following line of code be shortened?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!