1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldier1979 [14.2K]
3 years ago
5

What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network

Computers and Technology
1 answer:
Komok [63]3 years ago
6 0

Answer: vulnerability scanners

Explanation:

The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.

Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.

You might be interested in
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database da
aniked [119]
<span>With the use of a database application people can store and retrieve large quantities of data almost instantaneously. Database applications can also be used to present the information in easy to read and understand forms. Database applications serve as an intermediary between the raw data and a user, making it easier to sort and use the data.</span>
5 0
3 years ago
A security operation center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices
masya89 [10]

A type of virus that influences this circumstance in the network bandwidth is a worm.

<h3>What is Virus in technology?</h3>

In computers and technology, viruses may be characterized as a sort of malicious software, or malware, that extends between computers and provokes a deterioration of data and software either partially or completely.

The complete question is as follows:

  • A micro virus
  • a multipartite virus
  • A worm
  • a program virus.

Worms are memory-resident viruses that duplicate over the network resources. The primary consequence of this type of virus is to rapidly eradicate network bandwidth with its duplication.

This virus may also be competent to accomplish a Denial of services invasion by slamming O.S and servers.

Therefore, the correct option for this question is C, i.e. a worm.

To learn more about Computer viruses, refer to the link:

brainly.com/question/26128220

#SPJ1

5 0
2 years ago
Which type of operating system is usually used in personal computers
velikii [3]

The most common operating system for personal computers is Windows.

7 0
3 years ago
What is the process of attaching gage blocks to each other
const2013 [10]

The blocks are joined by a sliding process called wringing, which causes their ultra-flat surfaces to cling together.

7 0
3 years ago
The ________ utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage lo
umka21 [38]

Answer: File History

Explanation: File history is the history that gets created in the form of back-up that keeps the record of the stored files. It is used in protecting the files  that is present on the system like desktop, libraries,etc.

It creates the duplicate records in the storage for any future use and it can also be restored easily.File history also facilitates with feature of deleting the unnecessary history afterward when the user wants.

6 0
3 years ago
Other questions:
  • An analyst is reviewing the logs from the network and notices that there have been multiple attempts from the open wireless netw
    13·1 answer
  • How long does it take a letter to arrive?
    9·1 answer
  • On hearing my name, you may think that I am iterative, but I play a vital role in networking by boosting the signal strength to
    13·1 answer
  • Which of the following is true regarding data acquisition? Because data acquisition is often technical, the research team does n
    15·2 answers
  • Write a program that reads from the user any three points in two dimensional space: x1, y1, x2, y2, x3, y3. Assume these points
    13·1 answer
  • What is an information technology? ​
    12·2 answers
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    13·1 answer
  • What number will be output by the console.log command on line 5?
    9·1 answer
  • Which type of computer is used to process large amount of data​
    15·2 answers
  • Please help me with coding!
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!