Primary sources would be best
The answer is sort key. A Sort Key is the column of data in a database that is used as the basis for arranging data. Iy is also used for rearranging data in the column. An Operational Database is used to collect, modify, and maintain data on a daily basis.
Answer: A. passive attacks
Explanation:
Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.
A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.
Methods of carrying out passive attacks.
•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.
•Dumpster driving: Attackers or intruders search for information from discarded computers and
other gadgets, those information can help to attack a network.
Answer:
job search
Explanation:
job search bc you can look for jobs that are avalible online.