Pretty sure it's Fiber Distributed Data Interface
Answer: Stealth scanning technique
Explanation:
Stealth scanning technique consist of the following types of scans :
1. FIN scan
2. X- MAS tree scan
3. NULL scan
The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.
The X-MAS tree scan fires up by setting a TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.
NULL scans sends null packet and considers it to be an open port.
Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.
Answer:
Primary key retains its uniqueness even after you remove some of the fields.
Explanation:
I am assuming that this question is related to database. Therefore, I am answering it according to database context.
In database, you can have multiple rows and columns. Each column shows a specific attribute while each row plots the data according to the attributes. However, there is the first column of each of main table that has unique set of values. It is called the Primary Key. Some key features of primary key are:
- It always contains the unique value.
- Its value cannot be null.
- A table can have at max one primary key.
- It can be the combination of multiple columns but it must be unique.
Therefore, the primary key has the ability to retain its uniqueness even after you remove some of the fields.
Answer:
See the attached file for the answer.
Explanation:
(a) Find attached of question a.
b. the miss rate for the above instructions address sequence is 100% as no address is repeated.