1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivahew [28]
3 years ago
10

In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt

their own systems by exploiting documented vulnerabilities.
Computers and Technology
1 answer:
babunello [35]3 years ago
4 0

Answer:

penetration.

Explanation:

In penetration testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt their own systems by exploiting documented vulnerabilities.

You might be interested in
Michael a programmer, is writing an algorithm to solve programming problems, Guide him to write an algorithm
Nadusha1986 [10]

Answer:

Algorithms need to be simple, factual, and explained in simple but relevant vocabulary, and must be step by step, and none of the step should be missing.

Hence, first you need to understand the requirement, which can be yours or your clients.

Then consider each module of the problem, and separate each of them from the others. Now, understand the relationship between each module. And then you need to understand how you can combine them in one algorithm.

Also remember, the modules are functions. and various functions combine together to form an algorithm. We can have separate algorithms for each module as well, and then you can combine them together in right continuity to form the one single program.

Also, a project can have a loads of programs with other parts like images and various other assets and technologies.

However, everything starts with algorithms. And if are good at explaining, and a sound vocabulary, plus can explain the process well, you can explain the process well, and write a good algorithm definitely. Learn languages like Python, C, and C++  to start with, and then continue with Java, R etc. Remember we still uses functional programming as well like through Haskell etc.

The below is an example of sample algorithm. John wants to check what Ana has brought for him.

Step 1: Ana arrives with meat, which can be of goat or chicken

Step 2: John: Hi Ana

Step3: Yes John

Step 4 What meat is that Ana

Step 5: Goat

Step 7: Thanks Ana for Bringng Goat Meat

Step 8: Stop

In the above algorithm John confirms that what meat Ana has brought for him. And he comes to know She has bought Goat meat. This is the simplest of algorithm with no loop. And the complexity can be increased to any level.

Explanation:

The Answer is self explanatory, and has all that is required.

7 0
3 years ago
Read 2 more answers
What are the coordinates of point B in the diagram? A. (3.25, -2.5) B. (4, -5) C. (1, 3) D. (2.5, 0)
Pie
Isn't it B because the x is increasing by .75 and y is deceasing by 2.5
8 0
3 years ago
Read 2 more answers
How do i choose a most brainlyist
GuDViN [60]

Answer:

They’ll have to be 2 answers first, when 2 answers are given, you can choose which is branlyis. If there are no 2 answers, you can’t choose.

8 0
3 years ago
Read 2 more answers
If you weigh 100 pounds, and your 150 pound big sister is sitting 15 feet from the fulcrum of a seesaw, how far from the fulcrum
Dahasolnce [82]

Answer:

22.5

Explanation:

My weight = 100 pounds

Sister's weight = 150

Distance from fulcrum = 15 ft

Distance has an inverse proportion with weight

Distance = k/w

Where k is a constant

K = distance x weight

K = 100 x distance

150 x 15 = 100 distance

2250 = 100 distance

Divide through by 100 to get distance

2250/100 = distance

Distance = 22.5

5 0
3 years ago
Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other pa
AlladinOne [14]

Answer:

See attached pictures.

Explanation:

See attached pictures.

7 0
3 years ago
Other questions:
  • Devices such as monitors and printers that are connected to a computer are called ________.
    12·1 answer
  • Do you believe that oop should be phased out and we should start working on some alternative?
    13·1 answer
  • What to do when you strip a screw
    10·2 answers
  • Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
    8·1 answer
  • Write the proghrams for the following:
    13·1 answer
  • What is a well-planned strategy that ensures the search and navigation functions are easy to use and user-friendly on a website?
    15·1 answer
  • Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preforma
    8·2 answers
  • If you often purchase items at the same e-tailer and do not have to type in your username and/or password, this probably means
    13·1 answer
  • What is the output of the following program? If there is any problem, how can
    13·1 answer
  • Can someone write this in java? Also, does anyone know how to do Edhesive assignments?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!