1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
3 years ago
5

4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations

in their use on local machines, home networks, or small business networks? Where might customer data be stored? Discuss any legal issues in using these tools on home networks in the United States, which has anti-wiretap communications regulations. Who must know about the tools being used in your household?
Computers and Technology
1 answer:
Mashutka [201]3 years ago
8 0

Answer:

There are no limitation, policies or regulations that limit these tools for use on privately owned machines or home networks. In most businesses networks, intranets or internets the use of them is illegal if used for malicious intent. Penetration testing teams sign rules of engagement before using these tools.

Explanation:

There are no limitation, limitations, policies, or regulations in their use on local machines, privately owned machines or home networks, or small business networks.

In most businesses networks, intranets or internets the use of them is often and mostly illegal especially in a situation where they are been used for malicious intent.

Penetration testing teams would often or always make sure that they sign rules of engagement before using these tools.

You might be interested in
Can you get shocked from a breaker box?
Mashcka [7]
I dont think it would, but maybe you should Google it just in case.
4 0
3 years ago
A heart murmur is caused by incorrect operation of ________?​
Levart [38]

Answer:

the valves

Explanation:

science explains your questions answer. also did you know that the queen was an engineer in WWII? you probably did but you need 20 characters to submit an answere trust me it is the valves.

6 0
3 years ago
Which unique address is a 128-bit address written in hexadecimal?
pentagon [3]
Every hexadecimal digit represents 4 bits, so the address has 128/4 = 32 digits.

A GUID (Globally Unique IDentifier) has 128 bits. They are usually written like this:

{38a52be4-9352-4<span>53e-af97-5c3b448652f0}.</span>

There are different types of guids, depending on how they are generated. The first digit of the third group reveals the type. In the example above it is 4. A type 4 guid is fully random (except of course for the 4).

3 0
3 years ago
Define<br>operating System<br>with some examples​
Andrew [12]

Answer:

An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs

EXAMPLES:  Microsoft Windows, Apple macOS, Linux, Android and Apple's iOS.

Explanation:

7 0
2 years ago
Across:
anygoal [31]
26891jfootbggagusppdmvtgya rkofoocihhf.
6 0
2 years ago
Other questions:
  • If you work up to your potential but fall short of your goals, you
    15·2 answers
  • Does anyone know how to execute this assignment on Scratch?
    8·1 answer
  • When you open a program, the hard drive___
    6·1 answer
  • I need help fixing this please
    6·2 answers
  • Evaluate the arithmetic expression 234 + 567​
    10·1 answer
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • I'm surprised I haven't even got a single warning yet lol
    8·1 answer
  • The area of the spreadsheet highlighted in red is the _____.
    12·1 answer
  • Convert 12 bits to bytes​
    13·1 answer
  • Difference between software developer and software engineer.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!