Answer:
A. Spoofing
Explanation:
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.
IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.
Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take
Answer:
False
Explanation:
In our current market, we can find some messaging apps and social media designed for corporation organization setting. One example of messaging apps widely used in corporate world is Slack. The Slack enable user to set up different communication channel with their colleagues and flexibly set their working status.
FB also releases a corporate version of social media which is Workplace. The main attracting point is the contents are ad-free and you can expect to see company update or department news from the nesfeed.
Answer:
d. ICMP Echo Reply (type 0)
Explanation:
ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.
The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.
For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.
Answer:
The answer is "Block scope".
Explanation:
In the programming, the scope is a code, in which it provides the variable ability to exist and not be retrieved beyond variable. In this, the variables could be defined in 3 locations, that can be described as follows:
- Inside a method or the block, which is also known as a local variable.
- Outside of the method scope, which is also known as a global variable.
- Defining parameters for functions known as formal parameters.
Question:
Within the sites that support disaster recovery, __________ is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.
A) disaster site
B) hot site
C) warm site
D) cold site
Answer:
The correct answer is answer is D)
Explanation:
A cold site is a business location that is utilised as a backup in the event of a disruptive operational disaster at the normal business site. A cold site is an office, but it does not always have the necessary equipment to resume prompt operations. The business paying for the cold site, provides and installs this equipment.
Cheers!