White hat hackers use their capabilities to uncover security failings to help safeguard organizations from dangerous hackers. They can sometimes be paid employees or contractors working for companies as security specialists who attempt to find gaps in security.
C) Scream and run
you need to remain calm and carefully exit the building making sure you have everybody with you
Answer:
we dont have to expect , the technology are effective , as each day the technology are being advance and developed day by day. each day the technology are being more and more effective. they are effective now and they will be effective in future too
Answer:
FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false
Explanation:
Answer:
a. 0.01
b. 0.001
c. The identification field of the packet fragment can be used to uniquely identify and collate the fragments lost in transmission.
Explanation:
The probability of losing a packet is 10% or 0.1, so the probability of losing the packet twice during transmission;
= 0.1 x 0.1 = 0.01
When any fragments have been part of the transmission, the probability of the packet is dependent on the fragments;
= 0.01 x 0.1 = 0.001
The identification field is a unique 16-bit value assigned to an IPv4 packet, when a packet is fragmented for transmission, its field is used to collate the unique fragments in the packet.