1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivanzaharov [21]
3 years ago
11

Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro

ugh the trash of the target to find information that could be useful to the attacker. This process of going through a target’s trash is known in the community as Select one: a. Trash rummaging b. Garbage surfing c. Personnel surfing d. Dumpster diving
Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
8 0

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

You might be interested in
A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many tim
DerKrebs [107]

The command that would be given to execute a code that asks for input and runs it repeatedly until it has satisfied the condition is a do-while loop.

<h3>What is a Do While Statement?</h3>

This is a conditional statement that is used in programming to run a set of code and check the conditions set and commands to execute and finally terminates when the conditions are satisfied.

Therefore, based on the fact that a loop would be used, and the displayed text would be repeated many times, the do-while loop would be used for this program.

Read more about do-while statements here:

brainly.com/question/13089591

#SPJ1

6 0
2 years ago
Text and graphics that have been out of copied are stored in area called the _____
rodikova [14]

Answer:

Clipboard

Explanation:

when we cut or copy a text ,it is stored into a temporary storage called clipboard . clipboard is a temporary storage where text or graphics cut/copied is stored until it is pasted .

4 0
3 years ago
Read 2 more answers
Rainforests are not generally considered a source of _______. d.<br> none of the above
Alexus [3.1K]
Rainforests are generally considered a source of D. none of the above because you can get food, medicine and spices from rainforests. The plants in the rainforests have many medicinal properties.
5 0
4 years ago
In what way do media and networks interact? A.) Media are connected to networks tat make information easier to share. B.) Networ
kolbaska11 [484]

Your answer is A.... Hope this helps :)

6 0
4 years ago
c++ Write a for loop that computes the following sum: 5+10+15+20+...+485+490+495+500. The sum should be placed in a variable sum
ElenaW [278]

Answer:

#include <iostream>

#include <cstdlib>

 

using namespace std;

 

int main(){

 

 

   int sum=0, num=5;   //variables declaration and inicialization

 

   while (sum<500){   //conditioning to do the sum up to 500

   sum=sum+num;     //actually sum process

   cout << "The value is: "<<sum;   //show the result in screen

   };

   return 0;

}

5 0
4 years ago
Other questions:
  • Stan is looking at cloud computing options for his business needs. He wants a model that helps his business customers and client
    12·2 answers
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • To properly insert a memory module, you must locate the direction of the ______ .
    14·1 answer
  • count multiples(num1, num2, AND) Description: Returns the number of multiples of N that exist between num1 and num2 inclusive. P
    12·1 answer
  • If you need to set up direct deposit, which information from your check would you likely need?
    7·2 answers
  • TABLE TEST
    12·1 answer
  • PLZ HELP
    15·2 answers
  • Someone pls help me with this question (Java)
    5·2 answers
  • Explain the uses of computer in police department​
    13·2 answers
  • What is one way object-oriented programming differs from procedural programming?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!