1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
2 years ago
5

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Computers and Technology
1 answer:
Komok [63]2 years ago
6 0

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

You might be interested in
Who are the founders of Microsoft?
vekshin1

Answer:

Bill Gates, Paul Allen

Explanation:

The two founders of the mega-tech giant are Bill Gates, and Paul Allen. Hope this helps!

8 0
3 years ago
"the most common way to access the internet is through ________."
liubo4ka [24]
The most common was is your phone
6 0
3 years ago
"Hubs:
Butoxors [25]

Answer:

Hubs incorporate amplifiers and repeaters.

Explanation:

Hub is an outdated way of connecting ethernet devices, they incorporate amplifiers and repeaters, they do not allow simultaneous communication among connected devices.

The latest technology in connecting ethernet devices are with the use of switch.

7 0
3 years ago
3. In which of the following places can
maw [93]

Answer:

On the World Wide Web

Explanation:

Sure theres always a homepage somewhere. But i dont know what your researching so i went with c.

8 0
3 years ago
Read 2 more answers
Homework: Insertion Sort
Serga [27]

Answer:

Explanation:

I have written the code in Java. It contains the class Insertion Sorter which has the InsertionSort function. This function uses the insertion sort algorithm to sort a comparable array and if it fails to do so for whatever reason it throws an Illegal ArgumentException. If it sorts the array correctly it returns the number of changes that needed to be made in order to correctly sort the array. Due to technical difficulties I have attached the code as a text document below and proof of output in the picture below as well.

3 0
2 years ago
Other questions:
  • Please help
    5·1 answer
  • What is the assignment operator?
    15·1 answer
  • True / False
    5·1 answer
  • PLZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    11·2 answers
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
    9·2 answers
  • Write a full class definition for a class named Counter, and containing the following members:________
    9·1 answer
  • The information provided in text aids can help us to understand a text’s content before we even read it.
    8·1 answer
  • How many 3 byte sequences contain at least five consecutive 0-bits
    7·1 answer
  • ANSWER QUICKLY!!! <br><br> What is an advantage of digital portfolios?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!