Answer:
Threat assessment
Explanation:
A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.
Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.
Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".
Answer:
TEARDROP
Explanation:
Teardrop is a form of attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the victim may be tricked into sending messages to and from itself .
Teardrop attack also involves sending fragmented packets to a target machine in which the victim is been tricked into sending messages to and from itself. One of the fields in an IP header is the “fragment offset” field, indicating the starting position of the data contained in a fragmented packet relative to the data in the original packet.
Answer:
public class GetInfo{
Beverage[] beverages=new Beverage[100];
int i=0;
GetInfo(Beverage b){
beverages[i]=b;
i++;
}
public void Display(){
for(int i=0;i<beverages.length;i++)
cout<<beverage[i].tostring();
}
Explanation:
we are taking Beverages array to store all values and in constructor we are adding that to the list and Display() function prints the vale