Answer:
a monitor of ur heartbeat sleep breathing
Explanation:
I suggest learning and studying technology and the way a computer or a phone works and how it receives info. That way, you will be able to give the device something it won't handle...... I think....
Answer:
Option c: Heuristic
Explanation:
Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.
To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.
Answer:
The specific type of tools that can assist teams by identifying attacks and indicators of compromise by collecting, aggregating, and correlating log and alert data from routers, firewalls, IDS/IPS, endpoint logs, Web filtering devices, and other security issues are:
1. Arachni
2. Grabber
3. Iron wasp
4. Nogotofail
5. SonarQube
6. SQLMap
7. W3af
8. Wapiti
9. Wfuzz
10. ZedAttack Proxy Zap
Explanation:
The testing tool is capable of uncovering a number of vulnerabilities, to scan small web applications, to uncover over 25 types of web application vulnerabilities, to detect TLS/SSL vulnerabilities and misconfigurations, to measure the source code quality of a web application, to detect and utilize SQL injection vulnerability in a website’s database, to find over 200 types of security issues in web applications, to check web applications for security vulnerabilities.
The security testing tool supports command-line access for advanced users can also be used to intercept a proxy for manually testing a webpage.