1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AleksAgata [21]
3 years ago
7

An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of

error or system response to use to make inferences about the system or environment.
a. active
b. passive
c. dynamic
d. static
Computers and Technology
2 answers:
Elden [556K]3 years ago
7 0
The answer to this question is A
alisha [4.7K]3 years ago
6 0
The answer to the question A
You might be interested in
Louisa wants to purchase a used SUV that costs $12,750 from an automobile superstore. She has $4,000 to make a down payment and
liq [111]

Answer:

its a numbre

Explanation:

4 0
3 years ago
What does ADF Means?<br><br> What does CLO Means?
Elenna [48]
ADF means 'automatic document feeder'

CLO means 'collateralized loan obligation'
3 0
4 years ago
Which of the following would you classify as workplace violence? A. A co-worker tells you that you’ve got a great body and shoul
aev [14]
I believe it should be C, since it has the most immediate threat to your safety. 
8 0
3 years ago
Read 2 more answers
You installed a
pochemuha

Answer:

Not the admin

Explanation:

I believe this has to do with the user profile not being the administrator's profile, its asking for you to put in that information to show that the administrator of the laptop is allowing for the program to run on the laptop

6 0
3 years ago
A camera obscura is also called which of the following?
koban [17]

I believe it is (D) A pinhole camera

8 0
4 years ago
Read 2 more answers
Other questions:
  • A disadvantage of creating a website with tables, without CSS is
    15·2 answers
  • Why is ipsec considered to be a transparent security protocol?
    6·1 answer
  • How do i end my current plan that i never signed up for, the basic one it charged me $24
    11·2 answers
  • A popular Voice over Internet Protocol (VoIP) service is ________.
    12·1 answer
  • In ________ for final fields and methods the value is assignedlater but in ______ you assign the value during declaration.
    15·1 answer
  • Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
    6·2 answers
  • An example of a _________________ impact is when a consumer wants to buy a product on the internet but is afraid the company won
    8·2 answers
  • What is output? Select all that apply. c = 0 while (c &lt; 5): c = c + 1 print(c) 6 5 2 4 3 0 1
    9·1 answer
  • C. List three obstacles to effective listening.
    8·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!