Answer:
D) Your computer monitor will not switch on.
Explanation:
A written agreement or a document stipulating constraints and practices that a community computer network or an individual user must agree and adhere to is called an Acceptable Use Policy (AUP). Employees and students are required to sign an AUP when you sign up with an ISP. A good AUP will cover most provisions for network etiquette and indicate clearly the privacy levels of a member. The examples given in the multiple choices above are use cases for AUP apart from option D. If a user is not certain on the actions that should be taken in use cases like these, an AUP should be of great help.
Answer:
I recently watched a movie '1917'.
Explanation:
- The movie is about the war sequence in World War I, with Lance as a main character.
- The emotional portray of the actors is so strong that you can easily connect to the sequence of the story.
- Overall the movie is a roller coaster of your thriller and emotional experience.
- There are many bombs explosions, wounded shoulders, twists and turns in the movie that will surely keep you in the edge of your seat through out the movie.
Answer:
SELECT inventory_id, film_id, title, store_id, address_id
FROM Inventory.Inventory
JOIN Business.store ON Inventory.store_id = store.store_id
JOIN Business.rental ON rental.film_id = Inventory.film_id
JOIN film_text ON Inventory.film_id = film_text.film_id
WHERE COUNT(rental_id) = 0;
Explanation:
The JOIN clause is also used to query tables from two databases. The Inventory and the Business database are joined in the inventory and store table respectively. The Query also joins the inventory table and the film_text table to get the title or name of the film rented where the rental_id count is equal to zero.
Answer:
(B) It allows an attacker to redirect targets to malicious webserver.
(D) It affects any clients querying the poisoned DNS server.
Explanation:
DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.
Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.
The computer browser then get to the intended website through the IP address.
Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.
Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.
Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.
Answer:
kinesthetical
Explanation:
please give brainliest please and good luck :)