Answer:
Social Engineering
Explanation:
Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.
Giga usually means 10^9
We're trying to work giba, which is 2^30 into the vocabulary to differentiate them because of the confusion and difference that they create.
You click on the three dots and click the person silhouette with the plus sign on it.
Answer:
3 bits
Explanation:
Given a 4- way set associative cache that has 64 blocks of 16 words.
Therefore, the number of sets cache has:
Now,
Cache data size is 16kB
The number of cache blocks can be calculated as:
Now,
Total sets =
Total sets =
Now,
n = 6
For 15 bit address for the architecture, the bits in tag field is given by:
15 - (6 + 6) = 3 bits
Thus the tag field will have 3 bits
Some of the advanced viruses do this. So it would be true.