Answer:
In evil twin attack, the hacker can steal these users, user names and passwords to use them in fraudulent activities.
Explanation:
In Evil twin attack, hacker creates an access point with the same SSID as the nearest WiFi provider have. He block the SSID of internet provider for the end users and end users will access through SSID provided by the hacker. That is the reason this is called Evil Twin Attack.
In evil twin attack, the hacker can steal the password and user ID of the users to use them in fraudulent activities, can access their passwords and bank account numbers.
In above given case, where hacker does not know the SSID of any user, he may steal the User ID and passwords of all users using evil twin attack to involve them in fraudulent activities.
<h2>Dead lock is possible in Bank Transactions</h2>
Explanation:
Let us understand the term "Dead lock"
A deadlock is a situation where whole set of process is locked, since each of the process is waiting or holding the resource of another process. Each process will be interdependent and waiting for the same resource.
Deadlock is possible during bank transaction in the following situation:
A & B are two accounts where A tries to transfer funds to B and B tries to transfer fund to A.
When both tries to transfer funds at the same time, deadlock occurs.
A deadlock can be avoided by any one of the four methods.
They are: Mutual exclusion, No preemption, circular wait, hold and wait.
The correct term you're looking for in this instance is capacity as it limits the amount of storage on a secondary device
Answer:
d
Explanation:
i think, because it makes the most sense to me.