Answer:
Phishing and Social Media
Explanation:
A quick web search can give you this information. Terrorist organizations have used social media to socially engineer innocent people into joining their organizations and more. Phishing is also an attack that's used to obtain critical information such as hashes or plaintext credentials to get into people's accounts. This is a tactic that's also been used by terrorist organizations in the past.
Answer:
the smallest number start with the first number of the alphabet
Answer:
Option(b) and Option(c) is the correct answer for the given question.
Explanation:
TCP stands for transmission control protocol, In the TCP protocol firstly it maintains the connection between the sender and the receiver. The receiver always gives an acknowledgment to the sender when it receives the information that's why TCP is reliable protocol it is found in TCP/IP application layer protocols
UDP stands for user datagram protocol, In the UDP protocol, it does not maintain the connection between the sender and the receiver. The receiver does not give any acknowledgment to the sender that why UDP is not a reliable protocol . it is also found in the TCP/IP application layer protocols
- In the option(a) IP is found in the network layer that why this option is incorrect.
- In the option(d) FTP is found in the application layer thats why this option is incorrect .
Hence TCP and UDP are TCP/IP application layer protocols
Use the web for educational purposes.
Use the web for instructional reasons.
Use the web only when something you find interesting does not make sense to you.
Don’t use the web on a day to day basis.