1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
3 years ago
12

Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services

are running determine what exploits have been committed determine what systems are up and running
Computers and Technology
1 answer:
Rufina [12.5K]3 years ago
3 0

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

You might be interested in
True or False: if there are multiple operations inside a parentheses, you do not need to complete theses in the order of pemdas​
damaskus [11]

I believe this is false.

Happy to help.

5 0
4 years ago
Alexis has six different pieces of jewelry to show and describe
Pachacha [2.7K]

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question is not complete and the completed question is given below:

Alexis has six different pieces of jewelry to show and describe on a web page. Two are gold, and the rest are silver. Based on the principles of proximity, how would she display these pieces on her page?

  1. She would separate each and provide some distance between
  2. them
  3. She would mix the pieces and keep them all close together
  4. She would make two columns of jewelry with an equal number of  pieces in each
  5. She would group the gold together, and the silver together

Based on the principle of proximity, the correct answer to this question is:

She would group the gold together, and the silver together.

As you know that the principle of proximity states that things that are close together appear to be more related than things that are spaced farther apart. So based on this principle she needs to make two groups gold and silver. So, based on the proximity principle, she would group the gold together, and the silver together.  

4 0
3 years ago
(display five messages) write a program that displays welcome to java five times.
Nitella [24]
<span>/** * * * Exercise 1.2 - Display Five Messages * */ public class Ex01_02 { public static void main(String[] args) { System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); System.out.println("Welcome to Java"); } }</span>
4 0
3 years ago
Best location to install a patch panel?
sergejj [24]

Answer:

Explanation: In general, there are three positions for the patch panel to install in the stand column of rack, which depends on your cabling. When adopting ground outlet, the cables usually enter inside the rack from its bottom. So the patch panel should be mounted in the lower part inside the rack.

8 0
3 years ago
-1
N76 [4]

Answer:A flowchart is a diagram that depicts the steps involved in solving a problem. The following flowchart shows how to output the multiplication table ( n * 1 to m * 1) of a number, n and m:

3 0
3 years ago
Other questions:
  • An effective password can help prevent
    11·2 answers
  • Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
    15·1 answer
  • Kerrri uses a database file many time a day. To increase her productivity, she should___.
    15·1 answer
  • How to select the entire table in microsoft excel
    11·1 answer
  • Which statement best illustrates the relationship between three different
    12·1 answer
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • Your computer monitor’s power switch is in the ‘ON’ position; however, the display is blank. Which of the following is NOT a lik
    5·1 answer
  • Explain the effects of disposing electronic equipments to the environment ​
    13·1 answer
  • WILL GIVE BRAINLIST IF ANSWER IS RIGHT AND YOU TELL ME HOW YOU GOT YOUR ANSWER (dont copy and past from a site)
    10·2 answers
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!