1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
5

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Computers and Technology
1 answer:
Komok [63]3 years ago
6 0

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

You might be interested in
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
A program to add two numbers in C++
Paladinen [302]
I don't know if i understood correctly, but C++ can add numbers by using the + funciton. You could either use:
a = b + c
or
a = a + b
if you want to increment a variable.
7 0
4 years ago
Explain the working system of a computer with an example​
Romashka-Z-Leto [24]

<h2>{\underline{\fcolorbox{White}{pink}{ANSWER♥︎}}}</h2>

<u>The computer is the combination of hardware and software. Hardware is the physical component of a computer like motherboard, memory devices, monitor, keyboard etc., while software is the set of programs or instructions. Both hardware and software together make the computer system function.</u>

<h2><u>E</u><u>x</u><u>a</u><u>m</u><u>p</u><u>l</u><u>e</u><u>s</u><u> </u><u>:</u><u>-</u><u> </u></h2>

<h3><u>Mainframe Computer</u></h3>
  • Mainframe Computer. 20 in Kickin Technology Series: MainFrame Computers. MORE POWEeeer! Movie 1. ...
  • Desktop Computer. Movie: 2. Desktop Computers. ...
  • Laptop or Notebook Computer. Movie: 3. Laptop Computers. ...
  • Palmtop Computer or Personal Digital Assistant (PDA)
7 0
3 years ago
Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restri
trapecia [35]

Answer:

B

Explanation:

Which of the following is the best way to add a lengthy explanation to Excel data without being limited to cell sizes and restrictions? A. Adding a chart object B. Adding an Access object C. Adding a Word object D. Adding an Excel object microsoft word

Answer: B

6 0
3 years ago
How do I create a videogame
mote1985 [20]

Answer:

-Learn how to code

-Make Character

-Design

-Go to classes

-Go on video game platforms and make an video game(rblx is the best in my opinion)

-Play video games and see the scripts

-Decide what type of video game your making(horror, family game, battle game, etc.)

Explanation:

3 0
3 years ago
Other questions:
  • An art board on which text and graphics are pasted is known as a __?
    12·1 answer
  • A methods and measurements analyst for Digital Devices needs to develop a time standard for the task of assembling a computer mo
    15·1 answer
  • Differences between Quality of Services and a Service of Quality approach
    9·1 answer
  • What language below is used to view and manipulate data that is stored in a relational database?
    6·1 answer
  • How to do this question , please answer quickly , I’ll give branliest
    14·1 answer
  • It is believed that Taiwan is the original home of these early Oceania explorers. Maori Lapita Polynesians Aborigines
    13·2 answers
  • Anybody know this? Read the following scenario. Using complete sentences, explain which part of the CIA triad has been broken. M
    11·1 answer
  • I am fast when im thin, I'm slow when im thick.<br><br>Air is my weakness,<br><br><br>What am I?
    13·1 answer
  • Please use the tables in the flights database. Your deliverable should include a single SQL query that I can run against a "fres
    5·1 answer
  • Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!