Answer:
C. Phishing
Explanation:
There are various terms under digital attack, some of them are :
Whaling: whaling is one of the categories of phishing whose mainly targeted persons are mostly high ranked professionals.phishing search data for the hacking purpose.
Vishing: vishing is mainly termed for voice phishing. when a person calls any other person by using the name of some reputed company to get another person's personal data is known as vishing.
Phishing: when a person uses digital communication channel i.e. emails, by using the name of some reputed company to get another person's personal data is known as phishing.
Piggybacking: when a person gets access to another person's system or telephone by the illegal way is termed as piggybacking.
so, according to the scenario most appropriate answer is option C
1. Cellphones give "rewards" in the form of notifications that alert the user to a waiting surprise. This releases dopamine; a molecule that our body produces naturally. The presence of dopamine signifies lust, love, infidelity, motivation, attention, femininity, learning, and addiction. The mind & body begin to unconsciously (because dopamine is naturally occurring) crave that "high" one gets from, let's say, getting a large number of reactions to an Instagram post. As a result, the user posts more to get more reactions. They spend less & less time engaging with those around them. They are often irritated or anxiety ridden.
2. Alone time is EXTREMELY important & often difficult to get. One needs time to decompress, refresh & problem solve. This becomes an impossible task when one's senses are being constantly bombarded by ringtones & alerts.
3. Using electronic devices to frighten or harass. Ex- sending threatening emails.
4. Using electronic devices to bully someone with intimidating or hurtful comments and/or pictures.
5. Creating a fake social media or dating profile with the intention of deceiving people.
6. Electronically written code capable of stealing & destroying data.
7. Stealing & using someone's personal information for the purpose of financial/material gain.
8. Theft committed using a credit/debit card. It usually happens with online shopping.
9. The act of "breaking in" to an electronic device without authorization.
10. Acquiring money under false pretenses.
Answer: True
Explanation:
Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.
The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.
You'd call that 'metadata'.
Answer:
<em>B. 10.0.0.0/8.
</em>
Explanation:
Using an 8-bit subnet mask ensures the <em>network address is represented by the first octet of the IP address and is very efficient.</em>
The suffix /8 implies that Beth checks all devices in the 10.0.0.0 network (hosts between 10.0.0.0 and 10.255.255.255).