Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What method of attack (or combination of attacks) would you use? How does your motivation for hacking impact the type of attack that you employ? Discuss how you might approach hacking and how the motivation for your hacking impacts the methods you would use.

Answers

Answer 1

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:


Related Questions

At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.

Answers

Answer:

switch

Explanation:

At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.

a. scale b. log c. portal d. switch

A:

d. switch

Terry is a drafting technician who designs electronic designs. He uses software to design these design. Which file format does he use to save these drawings?
A. music file format
B. e-book file format
C. image file format
D. CAD file format

Answers

Answer:

D. CAD file format

Explanation:

What is your most valued item you have in your house or apartment?

Answers

Answer:

my book collection and nintendo

Explanation:

Which button on a desktop computer begins a reboot of the computer without power being removed from the computer's components?

Answers

Answer:

1. Click the Start button in the lower-left corner of your screen. You can also press the Windows key on your keyboard to open the Start menu.

2. Choose the Power icon.

3. When you click the power button, you will have the option to put your computer to sleep, restart it, or power it down.

Explanation:

Have a good day

When was the first analog device, the phonautograph, launched?
The phonautograph was the first analog device; it launched in _____
.

Answers

Answer:

1860

Explanation:

In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powered off. They then extracted drive encryption keys from RAM and used them to decrypt an encrypted drive. This is called a(n):

Answers


It’s called a “Cold Boot” attack

What is output by the following code?

for x in range (4):
for y in range (3):
print("*", end=" ")
print("")
Group of answer choices

* * * *
* * * *
* * * *
* * * *
* * * *

* * *
* * *
* * *
* * *

* * * * *
* * * * *
* * * * *
* * * * *

* * * *
* * * *
* * * *

Answers

Answer:

* * *

* * *

* * *

* * *

Explanation:

The inner loop will print 3 times *

For every outer loop, that 3 times * will be printed again => 4 times in this case

The end=" " is to add new line in each inner loop

Lab 8-1: Working with Boot Loader and Runlevels what is the root password

Answers

The root account on a Linux or Unix Operating System is the account with the most advanced privileges. The password to this account is called the "Root Password"

What is a bootloader?

The first thing that happens when the computer is powered on is that very important software is triggered. It is this software that helps the operating system (OS) to boot or load. This piece of software is called the bootloader.

By default, Unix OS does not have a root password. This must be set by the user. However, if this has been set and was lost, it may be reset using the following steps:

Boot to Recovery ModeDrop out to Root SheetRemount the File System with Write Permissionshere, type exactly the following command: mount -o rw,remount /Press "Enter" At this point, you should be able to make changes to the data on the hard drive. Next, enter passwd usernameretype the password and user name to confirm, thentype shutdown -r to restart the system.

Learn more about root passwords at:

https://brainly.com/question/26617114

it's 'p' at sign 'ssw0rd

Answer pls pls pls pls pls ​

Answers

Answer:

identify materials to create a prototype

Which view should be used if you want to see where page breaks will occur in a worksheet?.

Answers

Answer:

Page Break View

Explanation:

Q. Which view should be used if you want to see where page breaks will occur in a worksheet? answer choices Normal View Page Break View

How to recover yahoo password without phone number and alternate email?.

Answers

You call support and if they can’t help then ur doomed

What device turns digital data into an analog signal for sending it over the telephone line, and then turns it back into digital data when it reaches the other end of the connection

Answers

Answer:

The correct answer is D.

Explanation:

In electronics, a digital-to-analog converter (DAC, D/A, D–A, D2A, or D-to-A) is a function that converts digital data (usually binary) into an analog signal (current, voltage, or electric charge). An analog-to-digital converter (ADC) performs the reverse function.

A user calls to report that she’s unable to log on to e-mail, and you ask a couple of questions. Because you know that no one else is using the network right now, you can’t determine whether the problem is unique to her machine or affects the entire network. Probing further, you learn that she’s also unable to print. You decide this problem is probably easier to troubleshoot from the user’s computer. Using the eight-step problem-solving process, outline the items you must check and the questions you must ask when you arrive at the user’s office. B. Based on the possible responses to your questions, describe the actions you will take to correct potential causes of this problem

Answers

The outline of items that one must check is first to know or clarify the issue, break the issue down, etc.

What is troubleshooting?

This is known to be a step by step approach to problem handling that is often used to know and handle issues with systems etc.  

Others includes:

Set one's target in working on the issue, Analyze the main cause, Develop any form of Countermeasures.Then you Implement the Countermeasures made Monitor the Results that was givenGo through the Process to Standardize it and tell the user that it is solved.

Conclusively, By following the steps, one can know the issue and solve it.

Learn more about troubleshoot from

https://brainly.com/question/14394407

The questions of economics address which of the following? Choose three answers.
who
what
where
when
why
how

Answers

Answer:

Economists address these three questions: (1) What goods and services should be produced to meet consumer needs? (2) How should they be produced, and who should produce them? (3) Who should receive goods and services? The answers to these questions depend on a country's economic system.

So the answer would be WHAT, WHY & WHO. Hope this helps

Explanation:

You’ve been hired to help a bank automate their deposit/withdrawal system! Your task is to write a Python program that interacts with a customer in order to process a deposit or withdrawal.

Assume the customer has an initial balance of $1000 (you should store the number 1000 in a variable). Then, ask the user two things:

Whether they want to make a deposit or withdrawal

For this step, they should type a deposit or withdrawal, depending on what they want to do. It needs to be the exact spelling, including capitalization!
How much money they want to deposit or withdraw

For this step, they should enter an integer.
Then, your program should use an if/elif/else statement to do the following:

If the customer is making a deposit, add the amount to their balance.
If the customer is making a withdrawal, subtract the amount from their balance.
If the customer typed something other than "deposit" or "withdrawal", print "Invalid transaction.".
In this case, the customer’s final balance is just the same as their initial balance.
Finally, your program should use an if/else statement to do the following:

If the customer’s final balance would be negative (less than zero), tell them "You cannot have a negative balance!".
Otherwise, report their final balance.
Here are some examples of what running your program should look like:

Example 1:

Deposit or withdrawal: withdrawal
Enter amount: 500
Final balance: 500

Example 2:

Deposit or withdrawal: withdrawal
Enter amount: 1500
You cannot have a negative balance!

Example 3:

Deposit or withdrawal: deposit
Enter amount: 500
Final balance: 1500

Answers

Answer: See below

Explanation:

Description: In this program, read-option from the user and based on that, perform the operation. And display the balance if the balance is negative.

transactions.py

balance = 1000

#read options from the user

option = input("Deposit or withdrawal: ")

amount = 0

#check if option is a withdrawal

if option == 'withdrawal':

amount = int(input("Enter an amount: "))

balance = balance - amount

#check option is deposit

elif option == 'deposit':

amount = int(input("Enter an amount: "))

balance = balance + amount

else:

print("Invalid transaction.")

#check balance is less than 0 (negative)

if balance < 0:

print("You cannot have a negative balance!")

else:

print("Final balance:",balance)

What is the purpose of the website for David and his friends, and why did they choose that type of website?

Dave and his friends create short films and a web series. They want to distribute their work online. Dave and his friends should set up

a(n)

website in order to generate

by providing users access to their content.

Answers

A website is a great way for Dave and his friends to distribute their short films and web series. It allows them to reach a wider audience and share their work with people all over the world. They can also use the website to promote their brand and generate income through advertising or merchandise sales.

What is the website about?

There are several different types of websites that Dave and his friends could choose from, depending on their goals and the features they want to include. One popular option is a video hosting platform, such as You Tube or Vimeo, which provides an easy way to upload and share video content.

Another option is a blog or portfolio website, which would allow them to showcase their work and write articles or blog posts about the creative process. They could even use a combination of both depending on the series and content.

Therefore, the type of website that Dave and his friends choose will depend on their goals and the features they want to include. They could consult a web developer to help them make the best choice for their needs.

Learn more about website  from

https://brainly.com/question/28431103

#SPJ1

The __________ process is designed to find and document vulnerabilities that may be present because there are misconfigured systems in use within the organization.

Answers

answer.

I don't know what it is

Typically, hybrid drives use SSD to store the operating system and applications and hard disks to store videos, music, and documents.

A. True

B. False

Answers

Answer:

False

Explanation:

SSD's aren't as reliable as traditional hard disks, therefore, if the operating system is installed on the SSD and is stops working, the whole computer is broken.

William would like to use full-disk encryption on his laptop. He is worried about slow performance, though, so he has requested that the laptop have an onboard hardware-based cryptographic processor. Based on this requirement, what should William ensure the laptop contains

Answers

There are different kinds of applications. William should ensure that the laptop contains TPM.

What is the TPM as seen in a computer?

This is known to be Trusted Platform Module and called TPM for short. It is a  technology that has been set up to aid or give a kind of hardware-based and also security linked services.

Note that A TPM chip is said to be often be a kind of secure crypto-processor and as such it will be the best for William's laptop.

See full question below

Question 33:William would like to use full-disk encryption on his laptop. He is worried about slow performance, though, so he has requested that the laptop have an onboard hardware-based cryptographic processor. Based on this requirement, what should William ensure the laptop contains? a) AESb) FDEc) PAMd) TPM

Learn more about laptop from

https://brainly.com/question/26021194

A(n) __________ is a common list operation used in programming. Its purpose is to iterate through a list of items, one item at a time, and check each one to see if it has exactly what we are looking for.

Answers

Linear search

You implement this algorithm by iterating over each item, and checking if the item matches what you are searching for.

It is linear because it takes a linear amount of time to search for an item.

Which term refers to pretending to be a computer to work through lines of programming code?code blockingimportingdesk checkingsyntaxing

Answers

The computer programming that enables it to work with the line of programming code has been checking syntaxing.

What is computer programming?

The computer programming is given as the codes in the computer language for the operation of the task or the software program.

The line of programming for the code that enables the computer programming is checking syntaxing Thus, option C is correct.

Learn more about computer programming, here:

https://brainly.com/question/3397678

#SPJ1

Please help with this question in java.
Computers .​

Answers

Here is the program~

/*Pattern.Java.*/

import java.util.*;

public class Pattern_Prog

{

public static void main (String args[ ])

{

Scanner input = new Scanner(System.in);

int length;

System.out.print("Enter a word : ");

String word = input.next( );

length = word. length( );

for(int i = 0; i<= length; i++)

{

for(int j = 0; j<i; j++)

{

System.out.print(" ");

}

System.out.println(word.substring(0,length-i));

}

input.close( );

}

}

Hope it helps you!!

Being technologically literate requires being able to ______. a. use advanced graphics manipulation tools (adobe photoshop) b. use the most common operating systems (windows and apple os) c. adjust network settings for a company lan d. none of the above please select the best answer from the choices provided a b c d

Answers

Being technologically literate requires being able to use the most common operating systems (windows and apple). That is option B.

What are operating systems?

The operating systems are important software of a computer system which manages the computer's memory and other application software.

Examples of common operating systems include:

Apple operating system and

windows operating system

These operating systems are regularly updated by the technological companies that produced them. Therefore, being technologically literate requires being able to use the most common operating systems.

Learn more about  Operating System here:

https://brainly.com/question/22811693

which of the following is a benifit of googling yourself ?

Answers

Answer:

you are protecting yourself from identity theft

An information system’s _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks.

Answers

Answer:

vulnerability      hack/unauthorized access    liklihood/predisposition

Explanation:

Which software is used to play, create, and modify audio and video files?
software is used to play, create, and modify audio and video files.

Answers

Answer:

Adobe premiere pro, Maya.

Explanation:

There are many programs that do the following. I have listed two of the most well known softwares that can do this.

___ is a type of social engineering where a hacker lures individuals into entering personal information into a website controlled by the hacker.

Answers

A type of social engineering where a hacker lures unsuspecting individuals to enter personal information into a website controlled by the hacker is phishing.

What is phishing?

Phishing can be defined as a type of social engineering (cyber attack) which involves making an attempt to obtain sensitive user informations, especially by disguising one's self as a trustworthy entity in an electronic communication, which is usually over the Internet.

This ultimately implies that, a type of social engineering where a hacker lures unsuspecting individuals to enter personal information such as usernames, passwords and credit card details or bank account details into a website controlled by the hacker is called phishing.

Read more on phishing here: https://brainly.com/question/23850673

#SPJ1

Which statement would cause polarization?
a.
"I miss you."
b. "I agree with you."
C.
"You never listen to me."
d. "Can I talk to you?"

Answers

C. “you never listen to me” would cause polarization

In the following citation for a website, which detail is optional, according to
MLA style?
Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.
2014 .
A. Web.
B. 6 Mar. 2014.
C.
D. Home page

Answers

According to MLA style, the detail which is optional in the given citation for a website is: C. mapping link.

What is an information source?

An information source can be defined as a system or medium through which information, knowledge and ideas may be gotten (generated) and used by an individual.

What are citations?

Citations can be defined as references or links to all of the sources from which an author, writer, or researcher got his or her information from.

The characteristics of a MLA citation.

Generally, MLA citation often comprises the following information:

Author's last name and first name.Title of source.Title of container.Other contributors.VersionThe name of the publisher.Publication date.Location.

According to MLA style, the detail which is optional in the given citation for a website is mapping link.

Read more on citations here: https://brainly.com/question/8789070

#SPJ1

Complete Question:

In the following citation for a website, which detail is optional, according to

MLA style?

Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.

2014 .

A. Web.

B. 6 Mar. 2014.

C. Mapping link

D. Home page

Eli has 7 games on his phone. His sister has 6 more than him. Which ratio compares the number of games on Eli’s phone to the number of games on his sister’s phone?
6:13
7:13
6:7
7:6

Answers

Answer:

7:13

Explanation:

First figure out how many his sister has so 6+7=13 so the ratio is 7:13 because of how its worded since it says Eli's games first then thats how you get 7 then his sisters 13 so final answer 7:13 There is you answer

Answer:

The answer would be 7:13.

Explanation:

Eli has seven games and his sister has 6 more than him, meaning 13. This in ratio form would be 7:13. Hope this helps! :)

Other Questions
___ dating uses radioactive elements to _____ matter such as rocks and ___. As the radioactive elements _____, they turn into other elements. Scientist then use the ratio of the two elements to determine how old something is.a. fossilsb. knowc. chemicald. disintegratee. integratef. radioactive g. date please help me !!!!!!!! what is the y-value of the solution to the system of equations shown below? 5x+4y=12 -5x-2y=-16A. -4B. -2C. 2D. 4 Scientific knowledge allows new technologies to be built, and those technologies, in turn, impact society at many levels.options: True False Complete the following statements.a. Dan saves a portion of his income in an interest-earning account. In the loanable funds market, Dan is ___________.- a supplier of loanable funds.- a demander of loanable funds.- not in the market for loanable funds.b. John owns a pizzeria and needs to borrow money for a new oven. In the loanable funds market, John is ___________.- a supplier of loanable funds.- not in the market for loanable funds.- a demander of loanable funds.c. Savers like Dan are likely to save more when the real interest rate ___________. Therefore, the supply curve for loanable funds ___________.- increases- decreases- fluctuates wildly- slopes downwards- is constant at all interest rates- slopes upwardsd. Borrowers like John are likely to borrow more when the real interest rate ___________. Therefore, the demand curve for loanable funds ___________.- increases- decreases- fluctuates wildly- slopes downwards- is constant at all interest rates- slopes upwards How do I draw the circle correctly to solve the problem? PLEASE HELP!!! What text evidence shows how important lighter skin was to Richard's extendedfamily?A. Richard's uncles patting their faces with chalk during the dayB. Richard's sister hiding from bullies at the moviesC. Richard's cousins using hats to hide from the sun during school and workD. Richard's aunts making homemade remedies to lighten their children's skin Simplify the expression:10x+10x2+2x A softball has a volume of 125/6 pie cubic inches. Find the radius of the softball Solve the following problems. Show your work.1. A game designer used 9 ounces of clay to make 24 identical pieces for a game. What is the number of ounces of clay that were used for each piece?2. The equation x + 5 = 12 can be solved using one step. What is the step? Explain.3. Yvonnes age, in years is represented by y. Rebekahs age is one year less than three times Yvonnes age. What expression represents Rebekahs age in years?4. Students in a science class measured rain by writing down the depth of water in a bucket that collected the rain. The bucket was empty before the rain began to fall at a steady rate. Over a 6-hour period during school. After 3 hours, the water had a depth of 18 millimeters. What is the unit rate in millimeters per hour, did the bucket fill after rain started to fall at a steady rate?5. Laura uses 3 yards of fabric to make 2 skirts. She uses the same amount of fabric to make each skirt. At this rate, what is the total amount of fabric, in yards, she needs to make 6 skirts? Xander followed the process for tying a parisian knot. which question should xander ask to evaluate whether he has successfully followed the procedure? does my scarf look like the one in the picture? do i know anyone else who has a similar scarf? does my scarf match the outfit i am wearing? do i remember all the steps for tying it this way? The 14th Amendment has several clauses that deal with specific civil rights issues.How many clauses does our course talk about?37N55 Jane was drinking a glass of water. She asked her father where the watercame from. Her father said it was groundwater that was pumped up by theirwell. Jane wondered what the water looked like underground. This is whather family said:Mom: I think it looks like a huge ocean underground.Dad: I think it looks like a small lake underground.Jack: I think it seeps into little holes or spaces between the soil and therocks.Annie: I think it looks like a long, underground tube filled with water.Philip: I think it looks like an underground volcano with water spurting outof the top.Which person do you agree with the most Which of queen victorias children succeeded her in 1901?. Please help!! Will mark brainlyest. Tonja is a married taxpayer who claims 2 withholding allowances. She earns$600 per week, and pays $150 per week in childcare expenses. How much willshe save in federal income and FICA taxes if she has her childcare expensesdeducted from her check before taxes? Which graph represents 3x - 2y > 4? The interior of a building is in the form of cylinder of diameter 10m and height 8m, surmounted by a cone whose vertical angle is a right angle. Then what will be the area of the surface and the volume of the building? True or False? Stefan met Elena first. Not Damon.THIS IS FOR MY ART CLASS SO STOP DELETING MY QUESTIONS what influence does mary's prenancy have on the story