Answer:
Garbage in, garbage out
Explanation:
Garbage in, garbage out is the famous saying among computer programmers that incorrect, poor-quality, flawed, or nonsense input will produce incorrect, poor-quality, flawed, or nonsense output while correct, good quality or valuable input will produce correct, good quality or valuable output. it is basically saying that computers cannot tell the difference between good and bad data.
Answer:C
Explanation:it authorizes and authenticates all users and computer in a window domain- type network assigning and enforcing security for all computers and installing or updating software
C??i think sorry if wrong ..
When we talk about TCP/IP, we are talking about a protocol suite designed as a layered approach and used to interconnect computing devices across the entire continent. Internet Protocol (IP) is like the epitome protocol of the entire TCP/IP protocol suite and helps in the delivery of services. This IP is encapsulated into an IP header before your message is sent. Having briefly discussed about the IP protocol and the encapsulation, here is where typical TCP/IP attacks occur.
Explanation:
- IP address spoofing – As mentioned above, IP is encapsulated into packet headers and inside of those headers are information such as IP source and destination addresses. IP source and destination addresses are needed by the routers to determine the best route path. If hackers can get access to the IP layer, they could easily spoof the source address and somehow make it pretend as if it was another legit host.
- TCP sequence number prediction attack– This is very common. TCT/IP protocol suite contains a three way handshake. For instance, when you do a web search, what is happening is that you are sending information to the server. The server will receive this info and send an acknowledgment receipt with the information it received back to you. You will then send an acknowledgment message to the server and communication will be established. In between this handshake, there is a sequence number called ISN that hackers are able to predict from their own host computers, and this sequence number could send malicious packets to impersonate another source host on a network.
- Port Scanning – It is not a technique used to directly launch an attack. However, hackers can use port scanning to scan a target network for exploitable open ports or listening servers.
Learn more about cyber security
brainly.com/question/10889739
brainly.com/question/11111886
brainly.com/question/8603826
#LearnWithBrainly