Answer: Mutual authentication
Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.
In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.
Answer:
Spyware
Explanation:
Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware or stealthware
- This software is used in the business purpose which it may be used in the office to track the record of employee in the working hours .
- Spyware software is used to track the information without knowing the user.
Answer:
recognition
Explanation:
<h2><u>Fill in the blanks</u></h2>
When you take a multiple-choice test, you are relying on <u>recognition</u> , a means of retrieving information out of your long-term memory storage system that helps you choose the correct answer.
Answer: Phreaker
Explanation:
Phreaker is defined as the unauthorized attack on authorized communication system for stealing and manipulation phone networks.
- Exploring,searching and identifying telecommunication field with help of technologies,equipment,tools etc is done to exploit the system and resources .
- Other options are incorrect because phone hacking is attacking phone device, [email protected] is also hacking source and hacktivist hacks system to impact social and political field.
- Thus, the correct option is option(d)