Answer:
Selective Repeat protocols
Explanation:
It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.
If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.
But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.
Answer:
RainbowTables
Explanation:
RainbowTables is the best option when the cracker has limited time.
Answer:
This is a true statement.
Further Explanation:
The CPU is technically the brain of a computer, containing all the circuitry required to process input, store data, and output results.
Answer:
Option C is the correct answer for the above question.
Explanation:
Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.
The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-
- Option A states about direct mail which is not a type of attack.
- Option B states about instant messaging which is also not a type of attack.
- Option D states about spam which is used to send the spam messages.
- Option 'E' states about the mass mail which is used to send the lots of spam mail.
<span>Microsoft Excel is a spreadsheet developed by Microsoft for Windows, Mac OS X, Android and iOS.</span>