Answer:
PNG
Explanation:
PNG files can shrink to incredibly small sizes - especially images that are simple colours, shapes, or text. This makes it the ideal image file type for Web graphics.
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.
Explanation:
Answer:
A) True
Explanation:
Industrial espionage utilizes both illegal and unethical methods in gathering information about a corporate organization in order to get business intelligence. This involves stealing intellectual property and trade secrets to use them for a competitive advantage. because Information about company's products, services, finances, sales, etc can be toold for economic warfare