Answer:
by building on line presence
Explanation:
If you put yourself out there in multiple social sites you will build a following 
 
        
             
        
        
        
Answer:
a. social engineering attack
Explanation:
Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.
 
        
             
        
        
        
Answer: yeah i mean i use my canon camera 
Explanation:
 
        
             
        
        
        
Answer:
you can identify an ip address in the bar where u type links
Explanation:
 
        
             
        
        
        
Answer:
Option (D) i.e., synchronous is the correct option to the following question.
Explanation:
The following statement are the synchronous type of training because it is the type of training which is given to students or the persons for the purpose of knowledge in present time and the trainer or that person who give them information they can receive feedback and message at that time and all persons has permission to ask questions with them.
Option C is incorrect because in this type of training the interaction between the trainer and the receiver could not be established.
Option A is incorrect because the classroom-based training only for that person or the students who are available at that time at that place and in this video conferencing is not available.