Answer:
Is it Multiple Choice Question?
Answer:
C . Man-in-the-middle
Explanation:
The man-in-the-middle technique is about the interference of a third party in the communication channel, without any of the extremes being able to notice its existence, in this way, for the user as well as for the destination page the communication will seem normal.
In this case, by redirecting traffic to a PROXY server, the attacker will have the possibility to read all the information that passes through it, being able to obtain all the desired data.
Other Malware can be used to configure the connection of the computer through the PROXY of the attacker and in this way the channel is open, until the PROXY is disabled and the malware that redirects is blocked or uninstalled.
Answer:
For custom software= cost high
Packaged software = common softwares available publicaly like Office suite
Explanation:
The development costs of custom software are much higher than for packaged software because of the time, money, and resources that are required to design and develop them.
Answer: A
Explanation: For any formal document you need your major points.
This spreadsheet contains a circular reference. A circular
reference occurs in Excel when: A formula contains a cell reference to the cell
containing the formula itself. An example of this type of circular reference is
shown in the image above where the formula in cell C1 contains a reference to
that cell in the formula: = A1 + A2 + A3 + C1.