Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
Answer: C) Motion detectors
Explanation:
Motion detectors is the device that is used for detection of moving object in any area. They are used for security purposes by tracking motion or people and alerting the user.It consist of motion sensor for detection of motion and alerting the users or organization about security breach through alarming .
- According to the question,Chief information officer should implement motion detectors to investigate about theft that takes place in company's department on regular basis.Any intervention for company's loss will be alerted through tracking motion of the thief.
- Other options are incorrect because camera is used for recording videos and images. Bio-metric device is used for digital identification of any person to enter into a system. Man-trap is vestibule used for controlling access of a person for security.
- Thus, the correct option is option(C).
Answer:
c. An active attack
d. A passive attack
Explanation:
Traffic flow analysis is a cyber attack method of acquiring information by intercepting and examining messages so as to decode them by analysing patterns in the way the messages are communicated.
Traffic flow analysis can either be active or passive depending on if the attacker alters communication in the case of active analysis or simply extracts information in case of passive analysis.
Answer:
Know the sport really well so you can anticipate the moment when something exciting might happen. - c
Answer:
b. Application software
Explanation:
Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.
Examples:
Microsoft Office Word, Excel, Powerpoint
i think i did that right:)