Answer:
a) ARP spoofing
Explanation:
ARP Spoofing is a term in a computer networking, which is can be used as a penetration technique or attack methods in which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. The purpose is to spoof the MAC address of a trusted host and forge ARP request to overload the Switch. This will set the Switch in “FORWARD MODE” which will leads to any traffic meant for that MAC address to be sent to the attacker instead.
Answer:
The rule of four.
Explanation:
A procedure used by the Supreme Court in determining which cases it will hear is called the rule of four, after the number of justices who must vote to grant a petition for review.
Are you talking like a college degree? A little confused on the question but you need to take college courses and on the job training for a little bit before you get the degree.
<span>"Decay" theory suggests that memory is like any other biological process that deteriorates over time.
Decay theory recommends that memory blurs because of the minor entry of time. Data is in this manner less accessible for later recovery over the long haul and memory, and also memory quality, wears away. When we discover some new information, a neurochemical "memory follow" is made.
</span>