Answer:
Gaining Access Phase
Explanation:
Before the hacker gets to the maintaining access phase, two phases are already passed, these phases are:
<em>1. Reconnaissance</em> - Gathering all necessary information for the attack.
<em>2. Scanning</em> - using tools such as vulnerability scanners, network mappers, dialers among others to analyze the network using information gotten from the Reconnaissance phase.
Once the vulnerabilities of the system are discovered in the first two phases, the hacker is actively attacking the system in the third phase.
<em>3. Gaining Access</em> - At this phase, the hacker carries out the attack from the information retrieved from Phase 1 and 2. The system vulnerabilities already discovered are exploited efficiently to own the system. This can be carried out offline, through the internet, by having access to the host computer or through wired or wireless LAN.
Two phases come after the "gaining access" phase. They are:
<em> 4. Maintaining access</em> - At this phase, the hacker secures his access to the system from security personnel or other hackers. They ensure that backdoors are established to gain quick and easy access to the system for further attacks.
<em> 5. Covering Tracks</em> - log files are removed or modified by hackers to ensure that their actions are completely invisible to any suspecting person.
Answer:
anti-malware software programs that can be used to harden workstation computers
Explanation:
Microsoft Security Essentials can be regarded as antivirus software which gives protection to our computers used in home or for business against types of malicious software. These malicious software could be
✓trojan horses.
✓ computer viruses
✓spyware
✓rootkits, trojan horses.
Microsoft Forefront can be regarded as
security software for business roduced
by Microsoft Corporation. It was
designed to offer protection to computer networks as well as network servers and individual devices. It should be noted that Microsoft Security Essentials and Microsoft Forefront are anti-malware software programs that can be used to harden workstation computers
Routers<span> select a path for traffic in a network, or between or across multiple networks.</span><span>
If a given router can connect to at most k networks </span>R=N/(K-1) +1 routers are required to connect N networks.
Answer:
You use an append query when you need to add new records to an existing table by using data from other sources. If you need to change data in an existing set of records, such as updating the value of a field, you can use an update query.
Answer:
use and feedback
Explanation:
Once this is completed the software product is delivered to the user for use and feedback. If both testing and bug corrections have been completed it means that the product is finalized and working as intended. Once this is the case, all that is left for a development team to do is deliver the final product to the end-user for them to use and give their feedback as to how they like the product. Many times this feedback can restart the testing and bug correction phase once again if the development team decides to add new features.