Answer:
a. 1 is a packet, 2 is data, 3 is a frame.
Explanation:
And what is not mentioned is segment which used TCP/UDP and is part of Transport layer. The packet carries the destination and sender IP address, and is part of the Network Layer. The frame has the Mac address of destination device and senders device and is part of data link layer.
Hence segment has no IP address, hence b. is not correct. Also, data cannot have the IP Address, and Frame has the MAC address, Hence, the above answer. And this arrangement is part of Data Encapsulation.
Also keep in mind data can be anything like a series of bits, or any and it can or not have a header.
Answer:
The answer is C) SQL Injection
Explanation:
Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.
SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.
From the above brief definition; it is seen that the answer is C) SQL Injection.
Answer:
1. Read the End User License Agreement (EULA) for each software product you purchase.
2. Purchase CD software only from reputable resellers.
3. Purchase software downloads directly from the manufacturer's website.
4. Register your software to prevent others from attempting to install your software on their computers.
5. Report piracy if you discover that software you purchased is not authentic or if you suspect that an online reseller or retail establishment is selling counterfeit software.
Link: https://www.techwalla.com/articles/how-to-stop-software-piracy
-Please mark as brainliest!- Thanks!
Answer:
The service model employed for the data storage capability of only CST is:
SaaS (Software as a Service).
Explanation:
The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). The three cloud computing services provide different virtual computing resources. In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."