Answer:

Explanation:
d(x) = -2x - 6
to find the inverse of a function, you need to follow these steps:
1. set d(x) = y
2. interchange the variables, so y becomes x and x becomes y
3. solve the equation for y
<u>step 1:</u> set d(x) = y
y = -2x -6
<u>step 2:</u> interchanging the variables
y = -2x - 6 turns into x = -2y - 6
<u>step 3:</u> solving for y
x = -2y - 6 < add 6 to both sides to get rid of it on the right
x + 6 = -2y < divide both sides by -2 to get y alone
x + 6 / -2 = 
-2y / -2 = y
= y
so the inverse of the function is 
Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash
I can't tell you the answer without a picture, but to find the answer yourself: Go straight up from the cell containing 'Activity Questions' this will tell you a letter such as B. Go directly across to the left of the cell containing 'Activity Questions' this will tell you a number such as 3. The name of the cell I used as an example would be called B3.
No
.................................. :)
There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.
Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.
They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software
Learn more from
brainly.com/question/14728460