Answer:
Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.
Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.
Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system
Answer:
C. E-mail
Explanation:
Electronic mail is the best choice to convey urgent and highly sensitive information
he will need a microphone, it is a recording device.
Answer:
Number of packets ≈ 5339
Explanation:
let
X = no of packets that is not erased.
P ( each packet getting erased ) = 0.8
P ( each packet not getting erased ) = 0.2
P ( X ≥ 1000 ) = 0.99
E(x) = n * 0.2
var ( x ) = n * 0.2 * 0.8
∴ Z = X - ( n * 0.2 ) /
~ N ( 0.1 )
attached below is the remaining part of the solution
note : For the value of <em>n</em> take the positive number
It's more expensive, it's more difficult to configure and maintain and it can be more difficult to troubleshoot