This is an incomplete question. The complete question is given below:
Mike has never used slide presentation software before but he needs to create a presentation by the end of the week what resource would be most helpful to mike
a. The 350-page printed manual from the slide presentation software publisher
b. A free tutorial the slide presentation software publisher has posted on the company website
c. A trouble-shooting website created by a third party
d. The 350-page online manual from the slide presentation software publisher
Answer:
b - A free tutorial the slide presentation software publisher has posted on the company website
Explanation:
As Mike has a short time and no prior experience with a slide software, then in this scenario, the best, simplest and fastest way to learn and create a presentation a free tutorial which the slide presentation software publisher has posted on the company website as this is the same company that has created this particular software so he can be rest-assured that the resource he is relying on is authentic and up-to-date with information on latest features.
Moreover, it's efficient and quick way to learn from a free tutorial rather than from 350-page printed or online manual especially for a beginner.
Besides, his purpose is to create the presentation using the software and not trouble-shooting so trouble-shooting website created by a third party is not useful for him and it also might not be authentic or updated as well.
Answer:
C. Spoofing.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.
Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.
Answer:
serendipitous
Explanation:
this happened by chance in a positive manner.