I do. do you need help with it?
Answer:
The operations that can be carried out using process explorer include but are not limited to:
Explanation:
- Killing a Process Tree
- Ending or terminating a process
- Suspending a process
- Examining which process has locked a file
- Manually detecting a virus
- Unhiding a process. This can help to callup the window for a process that is not visible under normal explorer activities
- Monitor CPU usage
- setting the priority of a process
- changing a service process's access security
- Monitoring Graphics Processing Unit
Cheers
Answer: True
Explanation: Domain name system(DNS) is the kind of attack that exploits the functioning of the DNS .This process is also known as the DNS spoofing .The corrupted data is invoked in the cache database and thus creates spoof.
It creates diversion of the traffic from the actual servers to the fake servers and entering the exploited data in the cache database.Thus, the given statement is true.