Answer:
All of the given options apply and are correct.
Explanation:
a) The first option is correct because the intruder can use denial-of-service attack and by flooding the site with traffic to get the voter server unavailable. Then he can direct the voters to a fraud vote server.
b) The second options correctly applies too because the thief also buys the pass codes from the people who want to sell their right to vote and this way the thief can purchase multiple pass code and cast multiple votes.
c) The hackers can set up fake vote servers and then direct the voters to these servers or websites in order to collect pass codes of voters. These pass codes can then be misused by the thief to cast multiple votes in an online election.
d) Social engineering techniques can also be used to get pass codes from certain voters. By manipulating the targeted voters psychologically they can get their pass codes to cast multiple votes illegally.
She can use a flashdrive to store it, or she can go to her documents folder and store it. When she gets on the computer later, she can then continue working on the project.
Answer
Hi,
White Hat Hackers
Explanation
A hacker is a person who uses his or her computer skills in software and hardware to breakdown and bypass security steps in a computer. There are three categories of hackers; white hat hacker, grey hat hacker and the black hat hacker. The black hat hackers write malware to deploy in computers for cyber crime uses. White hat hackers are the opposite of the black hat hackers. White hat hackers are ethical hackers who find security loop holes in systems by using their hacking skills.
Best Wishes!
Answer:
can you explain more please I didn't understand