Answer: A. passive attacks
Explanation:
Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.
A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.
Methods of carrying out passive attacks.
•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.
•Dumpster driving: Attackers or intruders search for information from discarded computers and
other gadgets, those information can help to attack a network.
Assuming you're using Windows, you have to search for the application Device Manager. It will show you all connected devices on your system, as well as an option to modify drivers and certain options.
It is true that to <span>draw a clustered cylinder chart, first select the data to be charted and then click the column button (insert tab | charts group).</span>
Answer:
b. IT infrastructures and services
Explanation:
IT infrastructure or information technology infrastructure refers to the various components involved in the functioning of an IT enabled operations. These components include; hardware, software, network resources, etc.
It is usually internal to an organization and deployed within the confines of its own facilities.
Answer:
A binary system is a system that functions on zeros and ones (0's and 1's).
A decimal system is an Arabic numeric system that has 10 as its base and uses a dot which is also called a decimal point to show fractions.
Differences
- A decimal uses ten different digits which is 0-9 while a binary system uses just two digits 0 and 1
- Decimal system was historically a Hindu-Arabic system while the binary system is just an Arabic system
Similarities
- They are capable of performing arithmetic operations
- They both can be represented in decimal form