Answer: Environment sensing Collector
Explanation:
An environmental monitoring system or collectors is the process which a device uses in monitoring the quality of the environment. These devices or software allows for a realtime monitoring and checking of any parameter required. They are used to monitor and collect data on environmental conditions such as relative humidity, temperature, dew and frost point, differential pressure, pressure, flow, and many more.
Answer:
MAC Addresses (Destination and Source MAC address)
Explanation:
A switch has 3 primary functions:
- Forward frames
- Learn addresses
- Avoid loops
An Ethernet frame has the header, data and trailer and there are two specific fields in the header that helps the switch to know where to send data in future transmissions.
- destination MAC address
- source MAC address
every Ethernet frame has this and when the frame hits a switch or any device, any device can look at it ( an Ethernet frame ) and know where it is suppose to go and where it came from.
Every switch has a MAC address table where it stores MAC addresses of different computers on the network.
Example:
When a PC1 sends a frame to PC2 through a switch, the switch looks at the header of the Ethernet frame for the source mac address and adds the source MAC address to its MAC address table and also the port that it came through.
simply put:
A switch looks at the source MAC address to see if it knows it already, if it does. Great! no need to add it again to it's address table.
If it doesn't, it adds it's source address and the port that the frame came from.
This basically how the switch populates its MAC address table.
Answer: Virtual desktop infrastructure
Explanation:
The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system) is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.
The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.
All the other options does not involve with this technology so that is why option (D) is correct.
Answer:
DNS poisoning
Explanation:
This type of attack is known as DNS poisoning it is a very common attack that focuses on trying to redirect users of the site that has been attacked towards fake servers. These fake servers belong to the attackers and are used to collect the user's private data, which can then be used by the attackers for a wide range of malicious acts. Aside from stealing user information, this malicious data travels alongside regular user data allowing it to infect various servers easily.