Answer:
<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>
Explanation:
The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.
Answer: c.)
Explanation:
The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.
It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".
The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.
If one process set the FIN bit to "1", this means that it has no more data to send.
Adam D'Angelo is the CEO and co-founder of Quora, an online knowledge market. He was also chief technology officer and <span>vice president of engineering for Facebook.</span>
Answer: Both the server and the client send certificates
Explanation:
In a given network session the server sends a certificate to the client . The client is able to verify that the server's identity, the authentication uses a public encryption key and a digital signature .The client in turn retrieves a private key they can use to create a digital signature . A certificate is then sent by the client across the network to the server and it uses it to authenticate the client's identity . Once the server has confirmed that the client is who they say they are it grants access for the verified identification.