I am not 100% on this but i think you would want a Large depth of field.
Answer:
B. global
Explanation:
A global variable lives on even when a function returns.
<span>The answer is Event. A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.
</span>
Answer:
1. True
2. True
3. False
4. False
Explanation:
1. Information integrity is a term in computer business that describes the degree of accuracy, reliability and dependency of an information content, process and system.
The main purpose of Information integrity is to prevent or protect information from accidental or intentional but unauthorized changes.
Hence, it helps to ensure that data can be modified only by appropriate mechanism.
2. Pairing threats with vulnerabilities is a pair of risk analysis, that sets to determine the type of vulnerabilities a system or organization has, which can be paired with valid threats. Hence, the kind of risk involved in the vulnerability threats, can then be addressed.
3. Knowledge based identification (authentication) system which involves password or PIN are the most common form of authentication methods. Ranges from different devices such as phones and PC to platform such as website.
4. Biometric is a type of user authentication that relies on the measurement and calculation of the shape of the body, such as fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. It is often referred to as Physiological characteristics of Biometric system.
Answer:
The answer is C) SQL Injection
Explanation:
Cross-Site Scripting (XSS) attacks are a type attacks that occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
Cross-Site Request Forgery (CSRF) is a type of attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request.
SQL Injection is a type of cyber security attack where an attacker inputs a malicious input into an SQL statement., and the SQL server reads it as programming code.
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets.
From the above brief definition; it is seen that the answer is C) SQL Injection.