Answer:
Option A (Radio Frequency Identification)
Explanation:
Option A (Radio Frequency Identification)
Radio Frequency Identification:
This technology uses radio waves to transfer data between a reader and movable items. The benefit of this technology is we do not require physical contact with items and scanner.
Components of RFID:
- tags (computer chip)
- Reader
- Communication System
- RFID software
There are two RFID standards:
- Electronic Product Code (EPC) standard
- International Standard Organization (ISO)
Answer:
A Phishing Attack
Explanation:
The term "phishing" comes from the combination of the English term "fishing", which means to fish, with the term "phreak", often used to name the first telephony hackers.
It is a type of scam that uses technological mechanisms, usually based on messages, to persuade and deceive people, with a specific objective, which varies from attack to attack.
For example, sending you an email message with a link like a popular social media platform which is meant to trick you into submitting your login details thereby hacking into your account from the hacker's remote location.
Answer:
The answer to this question is "perimeter".
Explanation:
In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.