Answer:
"student ID, number and title" is the correct answer for the above question.
Explanation:
- The primary key is used to read the data of a table. It can not be duplicated or null for any records.
- The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID".
- The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".
- The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".
The question has the below multiple choices
A. Man-In-The-Middle (MITM)
B. Man-In-The-Browser (MITB)
C. Replay
D. ARP poisoning
The answer is B
As compared to the Man-In-The-Middle attack, the
Man-In-The-Browser attack intercepts communications between parties to
manipulate or steal data. This attack seeks to intercept and steal or manipulate
communication that exists between the browser and the underlying computer. It
begins with a Trojan infecting the underlying computer and installing an
extension into the web browser configuration.
Answer:
Honeytoken
Explanation:
Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.
Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.
Answer:
int main() {
int _2dArray[32][32];
for (int i = 0; i < 32; i++) {
for (int j = 0; j < 32; j++) {
_2dArray[i][j] = j + i * 32;
}
}
return 0;
}
Explanation:
Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.
Good luck!