Answer:
1.) There are 12 function keys 2.) The return Key
Explanation:
Answer:
Port scanner
Explanation:
The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.
google or search through pvps
Internal memory is used as the working storage space of the computer