Answer:
Option (A) A successful WPS attack has occurred
Explanation:
- WPS stands for Wi-Fi Protected Setup.
- Its a network security protocol in the Wi-Fi which has a vulnerability.
- The connection to the Wi-Fi can be established through the router in four ways. They are
- (a) PIN method
- (b) Push button method
- (c) Near field communication method
- (d) USB Method.
- Out of all the modes to be connected to the network, the PIN method has a flaw in it.
- In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
- In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
- Option (A) is correct.
- Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.
Answer: There are many different types of application architectures, but the most prominent today, based on the relationships between the services are: monoliths and N-tier architecture, microservices, and event-driven architecture and service-oriented architecture.
Explanation: A layered or N-tier architecture is a traditional architecture often used to build on-premise and enterprise apps, and is frequently associated with legacy apps.
A monolith, another architecture type associated with legacy systems, is a single application stack that contains all functionality within that 1 application. This is tightly coupled, both in the interaction between the services and how they are developed and delivered.
Microservices are both an architecture and an approach to writing software. With microservices, apps are broken down into their smallest components, independent from each other. Each of these components, or processes, is a microservice.
With an event-driven system, the capture, communication, processing, and persistence of events are the core structure of the solution. This differs from a traditional request-driven model.
The service-oriented architecture (SOA) is a well-established style of software design, that is similar to the microservices architecture style.
Answer:
public static double circleArea(double radius){
double area = 3.142*Math.pow(radius,2);
return area;
}
Explanation:
Find the complete program in java that prompts the user to enter a value for radius, stores it in a variable, calls the method circleArea() and passes the value for the radius, then displays the area.
import java.util.Scanner;
public class CocaColaVendingTest {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Please enter the value for radius");
double r = in.nextDouble();
//Calling the method circleArea()
double calcArea = circleArea(r);
System.out.println("The Area is: "+calcArea);
}
public static double circleArea(double radius){
double area = 3.142*Math.pow(radius,2);
return area;
}
}
Answer:
A. <Title> tag
Explanation:
Required
Tag that can be written in the <head> element
Of the given options, <title> is correct.
This is so because, it is compulsory to have the <title> tag and the only location where it can be placed is inside the <head> tag.
Its function is to display the title of a page
e.g.
<em><title> This is my first page </title></em>
Answer:
The oldest malware vector was emails.
Explanation:
Websites were not widespread early on into the internet, however it was very easy to have a virus that uses an email contact list, where it can send itself to other email addresses and spread.