Answer
Explanation:
Hacking is simply gaining access into a computer through weaknesses that were found in the network system.
We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.
These stages includes
1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering tracks.
I don't understand what you are saying but I'm willing to help
1. True
2. Usually true, but it depends on the search engine you're using. For example, Google lets you search for several words without commas.
Answer: (a) Target had security software, but the notification alerts from the software were ignored.
Explanation:
The security software was there in target but its notification alerts being ignored was something which was not thought to have been occurred during the Target security breach, as anyone could be alerted with the notification alert.