The answer is C) Availability.
Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.
Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.
C) Availability is the best answer because it is part of the CIA triad.
Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
Explanation:
If your asking the program in modular programming of Q-Basic & in sub procedure then here it is.
I hope it will help you..
<em>-</em><em> </em><em>Regards</em><em> </em><em>Rishab</em><em>.</em><em>.</em>
Answer:
D) ["Kathy Bones", "Jill Brewer", "Joe Schnook", "Tom Smith"]
Explanation:
The context of the problem explains a computer program that sorts names in "ascending order" (A to Z) since the ASCII table has capital A start a lower number and it increases from there to capital Z.
Notice how the attached file, which is a portion of the ASCII table, shows that letters after A are also higher in decimal value than the previous letter.
With this in mind, we know that all this program does is sort by last name alphabetical order. From there, just sort the given names using that same criteria, last name alphabetical order, and the correct answer is determined.
<em>Please put "Brainliest" on my answer if it helped you out!</em>
<em>If you want to learn more about this subject, you can search:</em>
<em>- ASCII Table</em>
<em>- Lists in Programming</em>
<em>- Sorting Procedures</em>
Answer:
Random-Access Memory
Explanation:
used as a short-term memory for computers to place its data for easy access
Answer:
Sniffing.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, etc.
Sniffing can be defined as a form of cyber attack in which a malicious user gains access to a private network with the intent of finding out what information is stored on the network.
A packet sniffer also known as a packet analyzer, is a computer software or hardware tool that can be used to intercept, log and analyze network traffic and data that passes through a digital network.
Basically, an unauthorized packet sniffer is used to steal user informations.
This ultimately implies that, sniffing typically involves monitoring and capturing internet traffic (data packets) that are transmitted through a private network in real-time by using a sniffing tool, which may either be a hardware or software.
In this scenario, a malicious user in an airport terminal seating area was able to connect wirelessly to a traveling employee's smartphone and downloaded her contact list. Thus, the type of attack that has taken place is referred to as sniffing.