1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
5

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Computers and Technology
1 answer:
Komok [63]3 years ago
6 0

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

You might be interested in
A website is unencrypted. Which tool can be used to stop the website’s traffic and analyze the information on it?
liraira [26]

Answer:

Web analytics support information about the number of users to a website and the number of page views. It helps measure traffic and popularity trends which is useful for market study.

Explanation:

6 0
3 years ago
Your company's IT management team is looking for an online tool to provide recommendations to save money, improve system availab
alina1380 [7]

Answer:

AWS Trusted Advisor

Explanation:

The IT management team can choose to host their system in Amazon Web Service (AWS) and utilize the AWS Trusted Advisor service to manage the resources. AWS Trusted Advisor is an online tool offered by Amazon to provide guidance to their client to manage the cloud resources by following some recommended good practices. This can save cost, improve system availability and performance and also to improve system security. AWS Trusted Advisor provide recommendation in real time and on regular basis. It will scan a client's subscribed cloud-based infrastructure and provide recommendation actions in five aspects which are cost optimization, performance, security, fault tolerance and service limits.

6 0
3 years ago
A friend of mine had a samsung j2 phone and someone with a iphone placed something in her phone she thought was malware in her p
natta225 [31]

Answer:

um I'm confused

Explanation:

3 0
2 years ago
Write the function listBuilder(l1, length) that takes a list of strings called l1 and an int called length and returns another l
Grace [21]

Answer:

The solution code is written in Python 3:

  1. def listBuilder(l1, length):
  2.    result = []
  3.    for x in l1:
  4.        if(len(x) >= length):
  5.            result.append(x)
  6.    return result

Explanation:

Firstly, we create a variable result to hold the list will be returned at the end of the function. (Line 1)

Next, we create a for-loop to traverse the string in the l1 list (Line 4) and check for each string if their length is equal or bigger than the input length (Line 5). If so, we use append method to add the string to the result list.

At the end, return the result list as output (Line 8).

7 0
4 years ago
Dos objetos que funcionen con engranajes corona y dos que funcionen con engranaje linterna
NARA [144]

Hola!

Pues mira en el engranaje corona tenemos: Una bicicleta y un reloj.

Y en el engranaje linterna: era usado en los molinos

Espero que te sirva. Saludos!

5 0
3 years ago
Other questions:
  • A ______ controls how computer hardware communicates with the operating system
    9·1 answer
  • You are considering creating a mobile app. Describe a basic statement for the app you would create and whether your app should b
    7·1 answer
  • What is meant by polling mode in communication between software andUART and what is its disadvantage as compared to interrupt mo
    14·1 answer
  • 1. Show the 16-bit representation of the decimal number 2437. Show your steps. 2. Convert the 16-bit representation of part (a)
    12·1 answer
  • Write a program that inputs a time from the console. The time should be in the format "HH:MM AM" or "HH:MM PM". Hours may be one
    6·1 answer
  • If a computer truncatesall numbers to two decimal places, compute the error forthe following: 23.345+222.34911)0.12)0.01413)0.14
    15·1 answer
  • Two technicians are discussing engine valve timing. Technician A says that the optimum valve timing is found through experimenta
    13·2 answers
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    14·2 answers
  • What code would you use to create the login button?
    11·1 answer
  • As part of its commitment to sustainability, a company is looking for a way to track the source of purchased goods and how they
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!