Answer:
MAN IN THE MIDDLE
Explanation:
Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.
A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.
Don’t know what the answer is but do you, I have the test for that today
Its use of the message digest 5 (MD5) hash algorithm for security.
CHAP uses a combination of MD5 hashing and a challenge-response mechanism, and authenticates without sending passwords as plaintext over the network. The security of the MD5 hash function is severely compromised.
Answer:
A.Use rounding to get -6(0.2), and then multiply. and D. use front end estimation to get -6(0.2), and multiply. and B.
Explanation:
just took the test
when using a dark background for presentations you should use bright colors to contrast with it
this makes the informations much easier to see and read for example white text on black background