The answer to "Which of these are branches of anthropology" is C... All of the above.
Answer:
c) PaaS
Explanation:
Refined and restrictive service model allows the user to use full package of application stack as demand by the service. It should be noted that "PaaS" is the most refined and restrictive service model.
Platform as a Service known as (PaaS ) is computing platform that gives room for the user in the cloud to manage applications.
PaaS helps to overcome the problem in managing the complexity of software licence. Example of PaaS are window Azure,Apache Stratos.
Answer:
Online activities are increasingly used to make real-world decisions.
Explanation:
People use increasingly <em>world wide web</em>. They create profiles and communicate with others on social networks, share thoughts and moments of their life on online platforms.
These <em>online</em> activities become part of one's identity. Therefore these activities can give information about user's behaviors, attitudes, likes and dislikes.
All this data are being used to make real world decisions about a user or a group of users. For example, trough one's online check-ins, frequently used location of the users or can be determined. Similarly, trough social media likes or posts, one's hobbies can be predicted.
Therefore, social media and online presence in general, is not necessarily safe or private but important places which have valuable information of the users that can be used in real world.
Answer:
nslookup
Explanation:
Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?
ans -nslookup
Answer:
D. Data exfiltration
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.
The type of attack in this scenario is best described as data exfiltration.
Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.
Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.