Answer:
Option(d) is the correct answer to the given question .
Explanation:
The Microsoft word is known as word-processing software.The main purpose of Microsoft word is used creating the text such that we can writing the paragraph or writing the letter to anyone in the Microsoft word .In this software there are many formatting tools are present that making the text effective and attractive .
- Instead of crating the text we cal also creating the table ,charts in the Microsoft word
- The database management software used for management the records its main purpose is not creating the text based document that's why this is incorrect option .
- Spreadsheet software is Microsoft excel that 's primary purpose used to maintain the record in the form of table its main purpose is not creating the text based document that's why this is incorrect option .
- Presentation software is Microsoft PowerPoint that is used for presentation its not main purpose to to create the text-based documents that's why this is incorrect option .
Answer:
Option (A) A successful WPS attack has occurred
Explanation:
- WPS stands for Wi-Fi Protected Setup.
- Its a network security protocol in the Wi-Fi which has a vulnerability.
- The connection to the Wi-Fi can be established through the router in four ways. They are
- (a) PIN method
- (b) Push button method
- (c) Near field communication method
- (d) USB Method.
- Out of all the modes to be connected to the network, the PIN method has a flaw in it.
- In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
- In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
- Option (A) is correct.
- Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.
Answer
The intranet security model
Explanation:
This is an enterprise system that processes user information for security and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.
The intranet security model is an efficient security procedure that incorporates web security access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.
The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked