Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.
Answer:
see explaination
Explanation:
//selective dev elements by id name
var gradeA = document.querySelector("#GradeA");
var passing = document.querySelector("#Passing");
var learning = document.querySelector("#Learning");
//function showGrades
function showGrades() {
var arr = [];
//converting string to int and inserting into array
arr[0] = parseInt(gradeA.textContent);
arr[1] = parseInt(passing.textContent);
arr[2] = parseInt(learning.textContent);
//creating json blob
var blob = new Blob(new Array(arr), {type:"text/json"});
return blob;
}
B.
it's literally common sense
Answer:
He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.
Explanation:
- UPnP stands for Universal Plug n Play.
- It is an easiest way that allows gadgets to find all other devices connecting to your network.
- This can also modify router settings to allow devices from outside the network to access the router.
- External IP address can also be obtained by the gadget and a new port forwarding map can be set
- So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
- UPnP is a vulnerability to the secure system