Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.
Answer:
A
Explanation:
Program system and software canot pulg in
Answer:
anycast
Explanation:
Anycast -
It refers to as the routing methodology and the networking address where only one destination address has more than two pathway for the end destination , is referred to as an anycast .
In this case , the router has the capability to select the pathway to reach the destination , depending on the latency measurement , cost , distance and hops .
Hence , from the given information of the question ,
The correct answer is anycast .