Answer:
<!-- Modified by selena ramirez - for html compliance -->
Explanation:
In HTML, <!-- .. --> tag is used to insert comments in the webpage code.
Comments written inside the tag is visible only on the code, and is not displayed in the browsers when the page is requested by the client computer.
<em>Comment tag</em> is useful when there is a lot of code and multiple developers are dealing with the same code.
Comments help developers understand what changed is made and why.
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
Answer:
Rootkit.
Explanation:
Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.
Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.
A volcano because its always erupting
Explanation:
Check the type of hard drive installed.
hope this helps you ❣️