Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.
Explanation:
Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.
Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.
Lenny might be either suspended
Or might be failed in that particular course
Answer:
a. 0.01
b. 0.001
c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.
Explanation:
The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;
= 0.1 x 0.1 = 0.01
When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;
= 0.01 x 0.1 = 0.001
The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.
Answer: Port
Explanation :
When we port a software from one computer to another computer or from one operating system to another operating system, it tries to adapt to the new environment of the machine by checking the required the configurations of the machine and then checking the available files in the software to run the machine.
The porting of a software also checks whether the software is compatible with the machine or not and if not then why.
Answer:
Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>
Explanation:
Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).
The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.