1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
2 years ago
12

Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services

are running determine what exploits have been committed determine what systems are up and running
Computers and Technology
1 answer:
Rufina [12.5K]2 years ago
3 0

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

You might be interested in
In order to drive safely, you need to ___________. A. possess good vision B. look to the side while keeping your head and eyes s
Elena-2011 [213]
The question is vague, but answer B is absolutely incorrect so by default choice A is correct ...  "good" is hard to define and your vision can be corrected by glasses allowing you to drive, etc.
6 0
3 years ago
If i took my SIM card out of my phone and put it in a router then connect the router and my phone with Ethernet cable would the
Advocard [28]

Answer:

ummmmmmmmmmmmm nooooo???

4 0
3 years ago
______ is the code that a user writes in order to create a document to display on the web
icang [17]

HTML(Hyper Text Markup Language) is the code that a user writes in order to create a document to display on the web.

Explanation:

HTML is a markup language used to create hyper texts that are platform-independent. Mark up feature can be linked to other web pages, e-mail, multimedia, documents, databases etc.

Tags are used in to identify each section like head, body, title, paragraphs, tables, images etc.

5 0
3 years ago
Can u please answer this​
Ivanshal [37]

Answer:

this worksheet can be found online

Explanation:

5 0
2 years ago
Read 2 more answers
The Matlab Script should:1. Clear the command window2. Clear the workspaceQuestion 1: Why do we clear the command window and wor
finlep [7]

Answer:

This is done for the simple reason of having more space to work on

Explanation:

This is done for the simple reason of having more space to work on. By clearing the command window and workspace you provide yourself with sufficient space to create new commands without the clutter of the previous commands. This also prevents your focus from shifting towards old commands and allows you to simply focus on the commands you are currently working on. This does not clear all variables from the script, it only clears the current screen but the previous commands can still be accessed by using the up-arrow key

5 0
2 years ago
Other questions:
  • What is the legal right granted to all authors and artists that gives them sole ownership and use of their words, software, pict
    9·2 answers
  • Information permanently stored on a hard disk, diskette, cd-rom disk, or tape, is called ________ storage.
    8·1 answer
  • Consider the following code: <br> x=9 y = -2 z=2<br> print (x + y * z)<br> What is output?
    10·1 answer
  • You can create a database using one of the many templates available or by creating a new ______ database.
    9·1 answer
  • Suppose your SOHO network connects to the Internet using cable modem. When you open your browser and try to access a web site, y
    8·1 answer
  • FTP is commonly used to __________ and __________ files to a server.
    12·1 answer
  • In a word-processing program, what are the easily accessible icons that allow you to print, save and change fonts with a click o
    8·1 answer
  • A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
    15·1 answer
  • Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
    7·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!