The options are missing from the question,below are the options to choose from;
A) incorrect (or missing) routes in a routers routing table
B) incorrect DNS configuration on the PC
C) incorrect default gateway configuration on the PC
D) duplicate IP addresses on your LAN
Answer: The correct answer to the question is option A
INCORRECT (OR MISSING) ROUTES IN A ROUTERS ROUTING TABLE.
Explanation: When it is possible for a PC to ping some devices but not actually all,we can then make an assumption that either it has a wrong subnet that is configured or the router from the path to the remote device actually has an incorrect or a missing routes to the device.
Answer:
Answer to the following question are,
Explanation:
Because these are the two associations data structures.
- Association List: are referred to that data type which contains the pair of the key and item in the Java Programming Language and Python Programming Language, it is called a dictionary data type.
- Tables or Hash Tables: are referred to that data type which converts the keys into the integer value.
You have to use control + s only. but if you want to save it in different format, use control + shift + S
Answer: d)Phishing
Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.
The example mentioned in the question about eBay's security issue is also related with phishing where the fraud mails are sent to the users to gain or steal their personal information.
Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Answer:
<em>it</em><em> </em><em>is</em><em> </em><em>a</em><em> </em><em>group</em><em> </em><em>of</em><em> </em><em>Web</em><em> </em><em>pages</em><em> </em>