Answer:
Basic auth is an authentication where username and password are sent with an HTTP request unencrypted (just base64 encoded).
OAuth is a scheme whereby you perform a login at an IAM server, which gets you a token, and then you provide the token with requests to another server.
Answer:
Option A; MINING THE SOCIAL MEDIA INPUTS.
Explanation:
Customer relationship management (CRM) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.
Social media mining is the process of obtaining big data from user-generated content on social media sites and mobile apps in order to extract patterns, form conclusions about users, and act upon the information, often for the purpose of advertising to users or conducting research.
The number listed from phone call would result in long distance charges to your phone bill, therefore, the issue of MINING THE SOCIAL MEDIA INPUTS should be addressed by the company to keep its CRM in line with your expectations.
Answer:
Physical security of fixed location (desktop) computers is Necessary to consider, because physical security is always something that must be evaluated. Very few locations are guaranteed to be secured.
Explanation:
Physical security is necessary because fixed locations accommodate facilities, equipment, network, confidential information, important data, software and so on.
Hence, to protect these valuables against theft, vandalism, and terrorism, the presence of physical security is very important. The physical security personnel must be trained and equipped with the necessities to combat the first attempt by thieves or terrorists before calling the police or other security parastatals.
Answer:
a rootkit is a program that takes advantage of very low-level operating system functions
Explanation: