1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fittoniya [83]
2 years ago
12

Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services

are running determine what exploits have been committed determine what systems are up and running
Computers and Technology
1 answer:
Rufina [12.5K]2 years ago
3 0

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

You might be interested in
There are ___ Federal Reserve Banks. Each bank is also in charge of its assigned District Banks.
s344n2d4d5 [400]
B. 12

There are 12 Federal Reserve Banks. Each bank is also in charge of its assigned District Banks.

6 0
3 years ago
What is the purpose of lookup tables in spreadsheet software
garik1379 [7]

You can easily find and changed the data by using lookup table. You can also find the data within few seconds.

7 0
3 years ago
Read 2 more answers
Web storage stores data in the browser in
Andrew [12]

Answer:

session.

Explanation:

Web storage stores data in the browser in sessions.There are two types of web storage APIs available local storage and session storage.Both of these storages are used to store data on client side.While session stores data in key/value pairs which consists of strings.The maximum Limit of data storage is about 5MB.

6 0
3 years ago
PLS HURRY <br> Look at the image below
fenix001 [56]

Answer:

one sec

what is that called?

if you have more than one try

then you should just take an "EDUCATIONAL GUESS"

it's a 50/50 chance

just take it

Explanation:

<h2><u><em>YOU GOT THIS MAN! :3</em></u></h2>

8 0
3 years ago
Match the following
kakasveta [241]

Answer:

Eraser tool -removes the unwanted part of the drawing.

Row -horizontal space running from left to right.

Text -Primary component of a multimedia.

Drawing Area -Working are of ms point program.

I hope this helps!! Correct me plz if I'm wrong. If I'm right, could you mark me as brainliest?

8 0
3 years ago
Other questions:
  • ANSWER ME PLS
    9·1 answer
  • The work principle is not always true<br> T or F
    11·2 answers
  • Which scenario depicts an ethical workplace practice by a business owner? A. sharing personal information of its employees with
    8·2 answers
  • #include &lt;iostream&gt;
    9·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • Someone gave me flashcards on a keychan. I have to memorize them and then give them back. Can I back them up to my PC by creatin
    5·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • Name TanushSAVAGE. As given in the picture, Subscribe!
    15·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
  • What is the function of ALU? <br>​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!