Answer:
It depends on the structure of the sentence.
Explanation:
This will be shown as grammatical mistake because both the spellings are correct. If we write the word weather instead of the whether, Ms word shows the grammatical mistake. This is because, if we want to write the word whether, we should use or in our sentence. Both of these words are comes together.
Example
I will take a leave whether its raining or not.
In above sentence, both whether and or comes together. If we write weather instead of whether it just show the grammatical mistake in the sentence.
Answer:
I recommend Digital Certification of User through trusted certification Authority, who is requesting to access the company website through VPN to make sure the identity of the user.
Explanation:
Digital Certificate is the type of identity key or certificate that is assigned to the users as per their request. It is a unique number that is assigned to the user to ensure the authentication that Who are you. It is same like our identity card number that shows our identity to someone as per requirement.
These certificates are issued by certification organizations that are registered or trusted. If the users are using VPN on their devices to access some website that may not be a trusted user or a malware that can hurt the company by breaching the security protocols. So, some companies didn't allow untrusted users to websites.
<em>Therefore, I recommend to my company that, they should ensure that the users that are trying to access the website through VPN must have some digital Certificate from trusted certification authority to ensure the identity of the users.</em>
<em />
Answer:
1. Sniffing.
2. Sequence number.
3. Phishing.
4. Null session.
Explanation:
1. Sniffing is a situation where someone examines all the network traffic that passes their NIC, whether addressed for them or not.
2. A sequence number is a 32-bit number established by the host that is incremented for each packet sent. It can be used by a computer administrator or network engineer to reorder packets.
3. Phishing is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users. Informations such as password, credit card details and other personal information can be gotten by an attacker through this process.
4. A null session is a connection to a Windows interprocess communications share (IPC$). A hacker can use a null session to gain unauthorized access to informations such as security settings, registry settings, username (User ID) about an end user.
Can you give a better picture plz