<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.
<u>Explanation:</u>
A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.
<span>A. Both Technicians A and B is the answer</span>
Answer:
Secure is the correct answer for the above question.
Explanation:
- When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
- The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
Answer:
i). Signed magnitude
Five bit representation = 11111
For positive 5 bit representation = 01111 = +15
For negative 5 bit representation = 11111 = -15
ii). One's complement
For positive 5 bit representation = 01111 =+15
For negative 5 bit representation = 10000 = -15
iii). Two's compliment
For positive 5 bit representation = 01111 = -15
For negative 5 bit representation = 10001 = +15