Answer:
C . Man-in-the-middle
Explanation:
The man-in-the-middle technique is about the interference of a third party in the communication channel, without any of the extremes being able to notice its existence, in this way, for the user as well as for the destination page the communication will seem normal.
In this case, by redirecting traffic to a PROXY server, the attacker will have the possibility to read all the information that passes through it, being able to obtain all the desired data.
Other Malware can be used to configure the connection of the computer through the PROXY of the attacker and in this way the channel is open, until the PROXY is disabled and the malware that redirects is blocked or uninstalled.
Answer:
Don't answer him because you don't know what he is going to do
Answer:
66 bytes, 50 bytes and 27 bytes
Explanation:
Cache can be defined as an area or type of computer memory in which information that is often in use can be stored temporarily and got to especially quickly.
It's a hardware or software that is used to store something, usually data, temporarily in a computing environment.
See attachment for a step by step solution to the questions.
Answer:C) Uninterruptible power supply
Explanation:Uninterruptible power supply(UPS) is the device that is used when the input source of power does not work or fails and thus it acts as a power supply in the emergency situation.This electronic devices in the protection of the hardware components of computer system etc.
Other option are incorrect because power strips, surge protector and password generator are no the devices that work during the power black out situation.Thus, the correct option is option(C).
Answer:
Yes. That's what the internet is all about. Saving resources through interconnected computers.