Answer:
SSH, HTTPS and SMTP
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Hence, SSH, HTTPS and SMTP are considered as secure network protocols.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
Answer:
A spreadsheet program included in Microsoft Office suit of application. Spreadsheets present tables of value arranged in rows and columns that can be manipulated mathematically using both basic and advanced functions.
Answer:
B. Change the router's default administrative password.
Explanation:
Whenever a user purchase a router for wireless network, a default password has been set for the device, which can be easily accessible to different users on the internet or that particular network. This will lead to unsecured that particular user in terms of hacking or stealing data or personnel information easily.
To make sure the security of customer on private network, the technician should change the router default password.
Capture is the shortcut category which displays a list of the network interfaces, or machines, that wireshark has identified, and from which packets can be captured and analyzed.
Therefore, the answer is Capture.